In the first step we restated each of the best practices as a
System State Goal that represents the state of the system in a
point in time when the practice is being correctly applied.
For instance, one of the best practices related to the operating
system is stated as follows: “Remove from the network stack
all unused/unauthorized protocols”. A potential system state
goal for this best practice is: “The OS network stack has no
unused/unauthorized protocol active”. Although obvious in
some cases, this rewriting step moves the focus from the
action to the consequences of the action. Additionally, as