This section gives a list of methods in which ways it is possible to setting up own services and describes its advantages and disadvantages. Besides that, it gives information about which threats are higher or lower by using the corresponding method. We distinguish between 6 threats[0]:
Confidentiality is keeping assets or knowledge about assets away from unauthorized parties.
Integrity is keeping assets undamaged and unaltered.
Availability is the assurance that assets are available to parties authorized to use them.
Consistency is when assets behave and work as expected, all the time.
Control is the regulation of access to assets.
Audit is the ability to verify that assets are secure.