CTF-CW-6
Across
- 2. Place in process where risk leaks in
- 3. Lightweight, portable way to package software
- 7. Temporary period of activity restarted
- 9. Replace identifying information with artificial identifiers
- 11. Issue, project, and bug tracker at Tekion.
- 12. The one managing day-to-day data operations
- 13. Someone outside your company doing work
- 14. Privacy principle limiting collection to necessary information only
- 15. Guarantee that a message was sent and received
- 16. Approved items or users that are allowed
- 17. Security Orchestration Automation & Response acronym
- 18. Isolated test environment
- 20. Security review step used by Tekion before release.
Down
- 1. Building data protection into systems from the ground up
- 4. Secret management and credential vault at Tekion.
- 5. Specific logic for finding attacks
- 6. List defining who can do what in a system
- 8. The one responsible for compliance
- 10. Completely removing threats or malware
- 19. Evaluation of privacy risks before implementing new data processing