Implementation should include
establishing, governing, and observing well-defined policies
naming conventions
creating password and access parameters
setting up user rights and privileges.