Six methods to reduce penetration risk