During a security audit of IT processes, an IS auditor found that there was no documented security procedures. What should the IS auditor do?