Neu

12345678910111213141516
Across
  1. 2. Security measures based on identified threats
  2. 7. Weaknesses that can be exploited
  3. 9. A security model assuming all devices and users are untrusted
  4. 12. Verifying user identities
  5. 13. Application Programming Interface
  6. 15. Summarized information
  7. 16. Isolated environments for running applications
Down
  1. 1. Deciding whether to allow containers to run
  2. 3. Recording events and information
  3. 4. A container security platform
  4. 5. Protecting data and systems from threats
  5. 6. Command Line Interface
  6. 8. A graphical interface for managing SUSE NeuVector
  7. 10. The execution of a program
  8. 11. The process of creating and delivering products
  9. 14. Adhering to regulations and standards
  10. 15. Representational State Transfer