Justification should identify security threats and vulnerabilities and explain why basic security measures are necessary on network devices.