The implementation stage consists in rolling out the methods and mechanisms designed to make the information system secure as well as applying the rules defined in the security policy.
The main mechanisms used to secure a network against intrusions are firewall systems. Nevertheless, this type of mechanism does not protect the confidentiality of the data on the network.
Therefore, most of the time cryptographic algorithms, which guarantee exchange confidentiality, must be used.
Setting up a secure virtual private network (VPN) can provide additional securisation because all communication is encrypted.