Across
- 2. Container security monitoring platform
- 3. Software as a service
- 6. Identity and access management
- 8. Simulated attack to test security
- 9. Role based access control
- 12. Network address translation service
- 13. Cloud security auditing tool
- 14. Intrusion prevention security system
- 15. Network segment inside cloud network
- 16. Cloud access security broker
- 17. Infrastructure as a service
- 21. Node agent managing containers
- 22. Unauthorized cryptocurrency mining attack
- 26. Recording system security activity
- 27. Installing security updates for systems
- 29. Multi factor authentication security method
- 31. Container orchestration platform
- 34. Incorrect cloud security settings
- 35. Data loss prevention technology
- 36. Intrusion detection security system
- 37. Serverless monitoring and security tool
Down
- 1. Platform as a service
- 3. Sensitive credentials stored securely
- 4. Cloud security organization promoting best practices
- 5. Security weakness in system
- 7. Verify every user and device
- 10. Cloud object storage
- 11. Kubernetes cluster key value database
- 15. Federated authentication protocol
- 16. Portable application runtime environment
- 18. Single sign on authentication
- 19. Private cloud network environment
- 20. Kubernetes cluster management interface
- 23. Container platform for applications
- 24. Secure cloud web gateway
- 25. Data protection using cryptography
- 28. Function execution cloud service
- 30. Network traffic filtering security system
- 32. Internet based computing
- 33. Cloud vulnerability scanning platform
