From the inspection of the IT/IS policies, we found some relevant topics are not included as follows;
Password Policy (at least Minimum Password Length, Password Change Intervals)
User profile management (for example, formal written of procedures for addition, modification, termination of user profiles, and housekeeping process) applied for all systems and applications
Physical access control (for example, computer/servers’ room authorized person access, request for visiting to the critical computer room, and etc.)
System development and change management policies and procedures (for example, formal written procedures of program change documentation, user involvement, formal approval before implementation, other policies and procedures based on the system development life cycle (SDLC) and the structured methodology, and control procedure for emergency changes and incident errors for program change, operating system change or upgrade, and computer equipment changes)
Incident/Problem management procedures (for example, Logging of reported problems, Accountable persons for each problem category, Escalation route, Service levels, Acceptance criteria to close the ticket, Management reporting of outstanding problems)