Updating the Access Control Design Process . . . . . . . . . . . . . . . . . . A-24Choose the Endpoint Integrity Solution . . . . . . . . . . . . . . . . . . . . . . . A-25Existing Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . A-25Vulnerability to Risks and Risk Tolerance . . . . . . . . . . . . . . . . . A-26 Management Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-27 Interoperability Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . A-28 Bringing the Factors Together . . . . . . . . . . . . . . . . . . . . . . . . . . . A-29 Choose the Endpoint Integrity Deployment Method . . . . . . . . . . . . A-30

ix

Page 13
Image 13
HP Access Control Client Software manual