1.6.11 Developing a Compliant System
Developing a compliant System must cover the following:
Information Security and Privacy Policy
Acceptable Use and Access Control
Hiring and Termination 
Date Storage and Date Classification
Documentation Labeling and storage
Wireless Networking Policy
Firewall Policy
Laptop Policy
Discard and Disposal Policy
Firewall and encryption Policy
Intrusion Detection Policy
Work Station Policy
Perimeter Security Policy