Neu
Across
- 2. Security measures based on identified threats
- 7. Weaknesses that can be exploited
- 9. A security model assuming all devices and users are untrusted
- 12. Verifying user identities
- 13. Application Programming Interface
- 15. Summarized information
- 16. Isolated environments for running applications
Down
- 1. Deciding whether to allow containers to run
- 3. Recording events and information
- 4. A container security platform
- 5. Protecting data and systems from threats
- 6. Command Line Interface
- 8. A graphical interface for managing SUSE NeuVector
- 10. The execution of a program
- 11. The process of creating and delivering products
- 14. Adhering to regulations and standards
- 15. Representational State Transfer