What are the three deployment considerations for a secure network?