Implement a network security plan.

Implementation should include explaining and enforcing well-documented use policies that ensure network security, including

  • Internet security software
  • antivirus or anti-malware software
  • protocol control
  • network segmentation
  • implementation of the principle of least privilege
  • acceptable use policies
  • access points
  • intrusion detection systems (host and network based)
  • intrusion protection systems (host and network based).