Across
- 1. Name of a modification that is not performed via the application business user interface
- 3. Strategic Access Management tool
- 5. Second goal of IT security
- 9. Third goal of IT security
- 13. Corporate .... Deviation (CDD)
- 15. The second step in risk management process
- 17. Chapter 8 of ASCA Procedure Manual
- 19. What document helps you to check whether you are compliant with our security standard
- 20. Opposite of DAST
- 21. Corporate instruction covering IBM Worldwide records management
- 22. Name of the tool that replaced WST
- 24. Standard describing requirements on IT Business Continuity
- 25. Standard that describes therisk severity guidelines
- 26. To what data types LEG116 applies
- 27. The first step in risk management process
Down
- 2. What is CHS162 applied for
- 4. What does ASCA stand for
- 6. First element of risk
- 7. Where the deviations are maintained
- 8. Other word for separation in Separation of duties
- 10. Where can you read through BPBC127? Where is it located?
- 11. Third element of risk
- 12. Standard that ASCA is driven by
- 14. Where the DSR requests are handled
- 16. California .... Privacy Act
- 18. Name of the new privacy tool
- 22. Who do you need confirmation from whether your application processes crown jewel data
- 23. Corporate instruction for registration criteria
