Across
- 2. This cloud security model involves splitting data into encrypted parts that are stored in different locations, ensuring that no single provider has access to the entire dataset.
- 4. What feature in AWS allows setting permissions for a user based on specific circumstances such as the user's IP address or the time they are accessing the service
- 5. feature allows the enforcement of specific security policies, like requiring multi-factor authentication, for API interactions based on user actions and origins?
- 6. mechanism ensures secure and temporary access to resources without storing long-term credentials, particularly in cross-account situations
- 9. What AWS service provides protection against distributed denial-of-service (DDoS) attacks and integrates with CloudFront and Route 53?
Down
- 1. Technique that spreads data across multiple servers to enhance security and reliability
- 2. threat intel dashboard
- 3. Azure interface for applications auditing adherence, Logs, exceptions, and custom diagnostics to fortify security oversight
- 7. A method used to ensure that cloud users can only access resources they are authorized for
- 8. Cloud service that offers firewalls, DDoS protection, and other network security measures
