Solved by verified expert:Implementation Plan
Develop a plan to implement the security controls and policies that you identified in previous sections.
Develop a plan to implement new security devices and modify existing security devices that are required to monitor the network and the polices that were created or updated.
Describe how these controls, policies, and security devices have addressed the key security areas of confidentiality, integrity, authentication, authorization, and nonrepudiation cryptographic services.**References