Identify and document the users who have access to the system components where the information is processed and stored.
No STIG checks reference this CCI.