This document discusses two policies for managers to approve and monitor new access and artefacts generated for demonstration of compliance. The recommended policies are encryption policy and vulnerability management policy. The artefacts generated for successful development of software include use cases, design documents, requirements, UML and class diagrams.