Security

123456789101112131415161718192021
Across
  1. 1. You can find me at rest or on the move (in-transit). (10)
  2. 3. Apply multiple layers of securty. (7,2,5)
  3. 5. Needs to be kept secret. (12)
  4. 7. I copy traffic for you to safely inspect. (6,9)
  5. 9. Trust no one. (4,5)
  6. 12. I can tell you when you need to reduce permissions. (11)
  7. 14. Use me to prevent unwanted traffic reaching your VMs. (8)
  8. 15. Using me allows you to implment the principle of least privilege. Acronym (3)
  9. 16. Use me to manage keys outside of Google Cloud. Acronym (3)
  10. 17. Enterprise way to adopt a Zero trust approach. (6,4)
  11. 19. If you look at me you can find out "who did what, where, and when". (5,5,4)
  12. 21. You're not alone and this approach helps reduce risk and cost. (6)
Down
  1. 2. De-identification technique. (16)
  2. 4. If you use me you do not need a VPN. Acronym(3)
  3. 6. I provide insights into your security posture. Acronym(3)
  4. 8. Use me to mitigate OWASP top 10 risks. (5,5)
  5. 10. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
  6. 11. Do you trust that container image? (6,4)
  7. 13. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
  8. 18. Use me to classify your data. (5,3)
  9. 20. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)