Across
- 2. Segregation of ____ ensures that a single individual does not have control over all aspects of a critical business process
- 5. BCP Tests and Wallet Cards are examples of business ___________ management documentation
- 7. Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
- 9. IT systems are located within approved data centres with access ____________ to appropriate IT personnel for legitimate activities
- 11. All users and their _______ on IT systems are uniquely identifiable so that any action performed with an account can be reconciled to an authorised individual
- 13. Cyber incidents are __________, prioritised, escalated and recorded as per incident response plans
- 14. Access ____ remain fit for purpose for the target user group based on their job functions and responsibilities to prevent inappropriate access to IT systems and services
- 15. Accounts are _______ or deleted in a timely manner after a user has been terminated or when access is no longer required
Down
- 1. Information assets are ________ for vulnerabilities and reported for remediation
- 3. Media in Controlled Critical Computing Facilities are handled and protected with the required level of _________
- 4. _____________ and elective cyber e-learning modules and phishing simulations are used to promote positive cyber security behaviours by employees and on-boarded contractors
- 6. Periodic _______ of all user accounts is conducted to validate user currency and access appropriateness
- 8. To protect technology assets from environmental factors (heat, fire, flood, loss of power, etc.). Data Centre environmental _________ are in place and managed regularly
- 10. Technology assets, systems and ____ utilising cloud solutions are governed and controlled in accordance with policy, standards and regulation
- 12. IT Services and the technology environment are ___ tested so that security vulnerabilities are identified and managed
