Implementation should include following an established security plan to ensure measures are in place to protect the network.