Cloud Security Best Practices

12345678910
Across
  1. 1. A security measure that requires multiple forms of authentication.
  2. 4. Notifications of security incidents are often referred to as _____
  3. 6. Cloud service model often used for sensitive data storage where the provider manages everything
  4. 7. This authentication factor often involves something you have, like a fingerprint or smart card
  5. 8. The practice of monitoring network traffic for unusual or suspicious activity.
  6. 9. The principle of assigning different access levels to different users or groups
  7. 10. Ensuring that data is kept confidential, intact, and available
Down
  1. 2. Protecting data by converting it into a code
  2. 3. A security measure that involves keeping software and systems up to date.
  3. 5. The responsibility for securing cloud resources is often shared between the cloud provider and the___