Identification should include a description of best practices for protecting a network.