Across
- 2. Giving users only the access they need—nothing more.
- 5. The policy for Keeping workspaces free of exposed confidential information.
- 8. Training staff to recognize and respond to security threats.
- 9. Screening individuals before granting access to sensitive systems.
- 10. Removing system access when an employee leaves or changes roles.
Down
- 1. Rules for creating and managing secure login credentials.
- 3. Guidelines for proper use of company systems and data.
- 4. Grants permissions based on job responsibilities.
- 6. Ensuring sensitive information is not disclosed to unauthorized people.
- 7. Protecting personal information from misuse or exposure.
