CTF-CW-6

1234567891011121314151617181920
Across
  1. 2. Place in process where risk leaks in
  2. 3. Lightweight, portable way to package software
  3. 7. Temporary period of activity restarted
  4. 9. Replace identifying information with artificial identifiers
  5. 11. Issue, project, and bug tracker at Tekion.
  6. 12. The one managing day-to-day data operations
  7. 13. Someone outside your company doing work
  8. 14. Privacy principle limiting collection to necessary information only
  9. 15. Guarantee that a message was sent and received
  10. 16. Approved items or users that are allowed
  11. 17. Security Orchestration Automation & Response acronym
  12. 18. Isolated test environment
  13. 20. Security review step used by Tekion before release.
Down
  1. 1. Building data protection into systems from the ground up
  2. 4. Secret management and credential vault at Tekion.
  3. 5. Specific logic for finding attacks
  4. 6. List defining who can do what in a system
  5. 8. The one responsible for compliance
  6. 10. Completely removing threats or malware
  7. 19. Evaluation of privacy risks before implementing new data processing