Which of the following security solution options will BEST meet the above requirements?

Company ABC has grown yearly through mergers and acquisitions. This has led to over 200
internal custom web applications having standalone identity stores. In order to reduce costs and
improve operational efficiencies a project has been initiated to implement a centralized security
infrastructure.
The requirements are as follows:
Reduce costs
Improve efficiencies and time to market
Manageable
Accurate identity information
Standardize on authentication and authorization
Ensure a reusable model with standard integration patterns

Which of the following security solution options will BEST meet the above requirements? (Select
THREE).

Company ABC has grown yearly through mergers and acquisitions. This has led to over 200
internal custom web applications having standalone identity stores. In order to reduce costs and
improve operational efficiencies a project has been initiated to implement a centralized security
infrastructure.
The requirements are as follows:
Reduce costs
Improve efficiencies and time to market
Manageable
Accurate identity information
Standardize on authentication and authorization
Ensure a reusable model with standard integration patterns

Which of the following security solution options will BEST meet the above requirements? (Select
THREE).

A.
Build an organization-wide fine grained access control model stored in a centralized policy data
store.

B.
Implement self service provisioning of identity information, coarse grained, and fine grained
access control.

C.
Implement a web access control agent based model with a centralized directory model
providing coarse grained access control and single sign-on capabilities.

D.
Implement a web access controlled reverse proxy and centralized directory model providing
coarse grained access control and single sign-on capabilities.

E.
Implement automated provisioning of identity information; coarse grained, and fine grained
access control.

F.
Move each of the applications individual fine grained access control models into a centralized
directory with fine grained access control.

G.
Implement a web access control forward proxy and centralized directory model, providing
coarse grained access control, and single sign-on capabilities.



Leave a Reply 0

Your email address will not be published. Required fields are marked *