What should be considered for an IT security template?