The identification of the security mechanisms based on
the Mechanisms Goals is then quite straightforward. Note
that, in some cases more than one mechanism may be
required for the state goal to be accomplished. In other cases,
different mechanisms may be used to accomplish the same
goal, possibly with different amount of automation.
Alternative ways of performing the same tasks are useful to
suit different administrators, environments and requisites.
Table II presents four examples of the mapping of security
best practices into System State Goal and Mechanisms
Goals. The complete mapping can be found at [17].
We summarize the process in three steps: