11 Essential Cybersecurity Controls

123456789101112
Across
  1. 3. maintaining list of all hardware, software and more
  2. 5. updating software to make sure there are no gaps or vulnerabilities
  3. 6. Method for limiting and controlling access to high-value systems, accounts, data
  4. 9. Should be offline, segmented and tested with RTO validation as a critical last line of defense
  5. 11. Product for detecting endpoint activity
  6. 12. _security to protect your organization from phishing attempts
Down
  1. 1. _classification and structured _ management. knowing where it lives and how it's protected is critical.
  2. 2. needed to review recorded events and activities within systems, networks, applications
  3. 4. _ segmentation, which limits blast radius, protects crown jewels, and slows down adversaries.
  4. 7. What method of security requires users to verify their identity with multiple forms of authentication?
  5. 8. often goes hand in hand with TTX
  6. 10. safeguards, policies, processes, or techniques designed to protect assets