Mission
Security Design
4 Modules
3 Challenges
10 hrs 10 mins
The Security Design mission is an advanced mission for Certified Pega Senior System Architects (SSAs) who are ready to take on the Certified Pega Lead System Architect role. This mission covers modules and topics that are required to design authentication services that verify the identity of operators, as well as effective authorization schemes that ensure users can access only the application features and data that they are authorized to access. This mission also discusses how to identify and address security vulnerabilities and design solutions that avoid common mistakes that can expose vulnerabilities in a system.
Available in the following mission:
Defining the authentication scheme
-
Module
Defining the authentication scheme
4 Topics
1 hr 30 mins
-
In most cases, you want to authenticate users when they log into an application to establish who they are and that they are actually who they say they...
Defining the authorization scheme
-
Module
Defining the authorization scheme
5 Topics
2 hrs 30 mins
-
In most cases, you want to restrict authenticated users from accessing every part of an application. You can implement authorization features that...
Defining the authorization scheme
-
Challenge
Defining the authorization scheme
5 Tasks
1 hr 30 mins
-
MDC wants to implement the following security requirements in its organization:
- City Managers and Accountants can see only financial information...
Security audits in Pega Platform
-
Module
Security audits in Pega Platform
4 Topics
1 hr 20 mins
-
Security audits in Pega Platform™ can help you assess the security measures, policies, and procedures of an organization to identify any...
Mitigating security risks
-
Module
Mitigating security risks
4 Topics
1 hr 40 mins
-
Securing an application and ensuring that the correct security is set up is important. Correct security entails making sure that users are actually...
Identifying and mitigating security risks
-
Challenge
Identifying and mitigating security risks
2 Tasks
20 mins
-
MDC's Delivery Service application prepares to go live. A security review is necessary before promoting the application to production, and any...
Analyzing security event logs
-
Challenge
Analyzing security event logs
3 Tasks
1 hr
-
MDC wants to ensure the security of its Delivery Service application by enforcing geolocation for all users. To detect potential security breaches...