KONE Cybersecurity week - 2025 : Solve the puzzle(Day 2)

123456789101112131415
Across
  1. 5. The safe house for digital treasures
  2. 6. The rulebook linking roles to access rights
  3. 10. The gatekeeper of the kingdom’s highest keys
  4. 13. The crisis access route concealed in security
  5. 14. The process uniting source and target records as one
  6. 15. How do users at KONE authenticate when accessing servers through PAM?
Down
  1. 1. Cutting off identity’s digital ties
  2. 2. The unbiased judge of system actions
  3. 3. Unseen bridge connecting separate realms
  4. 4. The governance check resetting entitlement trust
  5. 7. Digital key's silent guardian
  6. 8. The active connection between user and system
  7. 9. MyAccess uses which system as the authoritative source for onboarding, transfers, and exits?
  8. 11. The combined proof beyond just a password
  9. 12. Secret courier of user attributes