Security Solutions
ix
Updating the Access Control Design Process . . . . . . . . . . . . . . . . . . A-24
Choose the Endpoint Integrity Solution . . . . . . . . . . . . . . . . . . . . . . . A-25
Existing Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . A-25
Vulnerability to Risks and Risk Tolerance . . . . . . . . . . . . . . . . . A-26
Management Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-27
Interoperability Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . A-28
Bringing the Factors Together . . . . . . . . . . . . . . . . . . . . . . . . . . . A-29
Choose the Endpoint Integrity Deployment Method . . . . . . . . . . . . A-30