csm

12345678910
Across
  1. 1. A formalized set of rules that define how cloud services should be used securely.
  2. 5. A method used to analyze and mitigate security, operational, and financial threats in the cloud.
  3. 7. The structured implementation of modifications in cloud environments without disruption.
  4. 8. A major challenge in cloud computing where businesses become dependent on one provider.
  5. 10. A principle that ensures an organization is neither over- nor under-utilizing cloud resources
Down
  1. 2. cybersecurity concern where unauthorized parties gain access to sensitive cloud data.
  2. 3. A structured approach to cloud adoption aligning with business goals and IT infrastructure
  3. 4. A practice that allows businesses to scale cloud resources dynamically based on workload needs.
  4. 6. A computing model where resources such as servers and storage are provided on demand
  5. 9. The process of ensuring IT resources are available to meet fluctuating business demands.