Identity Security Crossword: IAM, PAM, IGA, CIAM & ZeroTrust
Across
- 1. Privileged Access Management acronym.
- 5. Open standard for access delegation, commonly used for API access.
- 6. Lightweight Directory Access Protocol, used for accessing and maintaining distributed directory information.
- 9. Security model that requires strict identity verification.
- 11. Single Sign-On, allows users to authenticate once and access multiple applications.
- 13. Multi-Factor Authentication, adds extra layers of security.
- 15. Process of granting or denying access to resources.
- 16. Customer Identity and Access Management.
- 17. Identity Governance and Administration.
- 19. Methods of verifying identity using physical characteristics.
Down
- 2. Process of verifying the identity of a user.
- 3. Role-Based Access Control, permissions based on user roles.
- 4. Process of removing user accounts and access rights.
- 7. Process of setting up user accounts and access rights.
- 8. Linking of a user's identity across multiple security domains.
- 10. Security Assertion Markup Language, used for exchanging authentication data.
- 12. Identity and Access Management framework.
- 14. Process of converting data into a secure format.
- 15. Attribute-Based Access Control, permissions based on user attributes.
- 18. Cyber attack to obtain sensitive information by disguising as a trustworthy entity.