This chapter focuses on the “general good security practices and traditional security management”. It describes security control mechanisms are mediocre at best in distributed networking and computing environments. Having the tools and solutions available within the marketplace is a beginning, but we also need strategies and migration paths to accommodate and integrate Internet, intranet, and World Wide Web (WWW) technologies into our existing information technology infrastructure. The chapter considers a phased integration methodology that initially focuses on the update of corporate policies and procedures, including most security policies and procedures. It explores existing distributed security architectures to accommodate the use of the Internet, intranet, and WWW technologies. The chapter also describes a security implementation plan that incorporates the use of new and emerging security products and techniques. It addresses security management and infrastructure support requirements to tie it all together.