Identity Security Crossword: IAM, PAM, IGA, CIAM & ZeroTrust

12345678910111213141516171819
Across
  1. 1. Privileged Access Management acronym.
  2. 5. Open standard for access delegation, commonly used for API access.
  3. 6. Lightweight Directory Access Protocol, used for accessing and maintaining distributed directory information.
  4. 9. Security model that requires strict identity verification.
  5. 11. Single Sign-On, allows users to authenticate once and access multiple applications.
  6. 13. Multi-Factor Authentication, adds extra layers of security.
  7. 15. Process of granting or denying access to resources.
  8. 16. Customer Identity and Access Management.
  9. 17. Identity Governance and Administration.
  10. 19. Methods of verifying identity using physical characteristics.
Down
  1. 2. Process of verifying the identity of a user.
  2. 3. Role-Based Access Control, permissions based on user roles.
  3. 4. Process of removing user accounts and access rights.
  4. 7. Process of setting up user accounts and access rights.
  5. 8. Linking of a user's identity across multiple security domains.
  6. 10. Security Assertion Markup Language, used for exchanging authentication data.
  7. 12. Identity and Access Management framework.
  8. 14. Process of converting data into a secure format.
  9. 15. Attribute-Based Access Control, permissions based on user attributes.
  10. 18. Cyber attack to obtain sensitive information by disguising as a trustworthy entity.