Development should include explaining and enforcing well-documented usage policies that ensure network security, including
- Internet security software
- antivirus or antimalware software
- network segmentation
- principle of least privilege implementation
- acceptable use policies (AUP)
- intrusion detection systems (host- and network-based)
- intrusion prevention systems (host- and network-based).