This document discusses effective strategies for implementing honeynets in security. It describes different levels of potential attackers from very high to low. It explains how honeynets can be used to identify unauthorized and potentially malicious authorized users by separating production systems from external honeynet systems. The document also lists requirements for a high grade security strategy using integrated tools like honeynets, honeypots, honeytokens, network intrusion detection systems, and security information and event management.