Implementation should include configuring network devices with device hardening features to mitigate security threats.