CLOUD AND DATA SECURITY

1234567891011121314
Across
  1. 4. The practice of defining who can access what in cloud services
  2. 8. The process of giving permissions to users in cloud environments
  3. 9. A system that manages users’ access to cloud services
  4. 11. The main reason organizations use IAM
  5. 13. A key component of IAM that ensures secure user authentication
  6. 14. The practice of defining and managing user roles and privileges
Down
  1. 1. The boundary that separates trusted and untrusted systems
  2. 2. A key challenge in IAM that involves controlling multiple access points
  3. 3. A security mechanism that verifies the identity of a user before granting access
  4. 5. A security method ensuring that only authorized individuals can access data
  5. 6. A widely used authentication standard for cloud services
  6. 7. The process of verifying a user's identity before granting access
  7. 10. The act of reducing risks related to data breaches
  8. 12. The organization responsible for cloud security