C) Enclosed proving files, including: files describing and detailing the overview of the knowledge system; construction structure documents approved by skilled authorities or equivalences; documents proving the suitability with the factors for inclusion during the Listing of significant nationwide security info systems; documents describing methods to protect info techniques (ideas https://thitbanninhhni99988.bloggip.com/29608270/top-guidelines-of-ninh-son-tay-ninh