Cloud (Data Centre) Controls and Cyber Controls

123456789101112131415
Across
  1. 2. Segregation of ____ ensures that a single individual does not have control over all aspects of a critical business process
  2. 5. BCP Tests and Wallet Cards are examples of business ___________ management documentation
  3. 7. Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
  4. 9. IT systems are located within approved data centres with access ____________ to appropriate IT personnel for legitimate activities
  5. 11. All users and their _______ on IT systems are uniquely identifiable so that any action performed with an account can be reconciled to an authorised individual
  6. 13. Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans
  7. 14. Access ____ remain fit for purpose for the target user group based on their job functions and responsibilities to prevent inappropriate access to IT systems and services
  8. 15. Accounts are _______ or deleted in a timely manner after a user has been terminated or when access is no longer required
Down
  1. 1. Information assets are ________ for vulnerabilities and reported for remediation
  2. 3. Media in Controlled Critical Computing Facilities are handled and protected with the required level of _________
  3. 4. _____________ and elective cyber e-learning modules and phishing simulations are used to promote positive cyber security behaviours by employees and on-boarded contractors
  4. 6. Periodic _______ of all user accounts is conducted to validate user currency and access appropriateness
  5. 8. To protect technology assets from environmental factors (heat, fire, flood, loss of power, etc.). Data Centre environmental _________ are in place and managed regularly
  6. 10. Technology assets, systems and ____ utilising cloud solutions are governed and controlled in accordance with policy, standards and regulation
  7. 12. IT Services and the technology environment are ___ tested so that security vulnerabilities are identified and managed