Compliance Champions League 2023 - Crossword

1234567891011121314151617181920
Across
  1. 3. Attachments are made visible externally by setting the _ flag:
  2. 6. Once a product is out of extended maintenance phase, customer can opt for _________ Maintenance:
  3. 10. Patch Day notes are released on 2nd _________ of every Month :
  4. 11. Subscribe using the _ to receive email notifications on external updates for cases :
  5. 12. Software with rating ___________ at SAP should not be installed:
  6. 13. Business continuity plans must be documented, maintained, audited, and regularly tested in preparation for unforeseen risks to business operations. They can be found in the Portalusing the quicklink /go/ _______________ :
  7. 15. _______ notes must be entered to put the case to status Resolved:
  8. 16. The _____ feature enables SAP to secure the usage of any application specific function:
  9. 18. _______ tool targets at providing missing functionality and enhancements to Agent Workspace:
  10. 20. _______ field ensures that the action plan step documented will be visible to the customer:
Down
  1. 1. We can find the latest SAP logo and word/ppt templates at www.______.com :
  2. 2. If the security vulnerability doesn't affect any customers as the coding was never shipped to customers, ________________ flag should be set in the security incident.
  3. 4. _____________ Maintenance Strategy is used by customers to request a quotation online in SMP:
  4. 5. Which Board area does AIS belong to?
  5. 7. To installl a software which is not listed in software center, we get it via go/ :
  6. 8. What should be the status of a product security incident if you get a CVSS score of 0.0.:
  7. 9. While working from home, If something is lost, or you suspect that SAP information has been disclosed without authorization - Make an appropriate report in the_____ :
  8. 14. What should be the final status of a Security Incident:
  9. 17. How is the priority of the security note calculated?
  10. 19. You receive a suspicious email that asks you to share your personal data, or contains fake links, suspicious mail layout. You would report such suspicious emails to _________@sap.com: