Implementing an Information Security Baseline