Based on demand, an IaaS provider wants to deploy a security application for its customers.
Which of the following is the BEST technique for the IaaS provider to apply this to target systems?
A. Vendor application
B. Scripting
C. Orchestration
D. Custom programming