Across
- 7. Keeping cloud workloads separated for security.
- 9. Giving users only the access they need.
- 10. Unauthorized access to a system.
- 11. Dividing networks to improve security.
- 12. Security extensions for DNS.
Down
- 1. Duplicate data stored for recovery.
- 2. Recording events in a system.
- 3. Web Application Firewall.
- 4. Watching for suspicious activity.
- 5. Rights granted to a user or role.
- 6. Permissions to use resources.
- 8. Isolated environment for testing.
