Implementation should include establishing, governing, and observing well-defined policies, naming conventions, and password and access parameters.