CyberSecurity 1
Across
- 3. Entitlement is very closely related to ... performed
- 4. ... to standard is verified during audit
- 7. IAM also differentiates 'authenticate' and ...
- 8. We differentiate between User and ... in IAM
- 9. ISO 27000 standards has 14 categories for ...
Down
- 1. S in SOD
- 2. Issue faced by user in IT
- 5. A in CIA
- 6. C in PDCA
- 8. Example of non-human identity