Across
- 2. Federation is used to establish a ----- relationship between organisations
- 3. This abbreviation is used to ensure that users have just enough access, just in time
- 5. These reviews are done to evaluate group membership and role assignments to ensure that the correct users are in the correct places
- 9. ......... is one of the goals of the cyber security strategy which is ensuring data or messages haven’t been tampered with
- 11. This identity can be used for authentication and authorization to on-premises and cloud resources
- 13. ........... access policies can be used to examine signals such as location, device, ip address and either allow or block access to Azure
- 15. ........ as a Service solutions allows users to access and use applications over the internet - eg Microsoft 365
- 16. .......... a file means the data in the file is only readable to users with the appropriate key
- 17. This score measures an organisation's progress in completing actions that reduce risks associated with data protection and regulatory standards
Down
- 1. This is the process of verifying who you are
- 4. This is the abbreviation used to describe the login process when it requires users to enter more information than just a password.
- 6. ........... management allows multicloud discovery, remediation, and monitoring of privileged access across Azure, AWS, and GCP
- 7. This is the process of verifying whether a signed in user can access a specific resource
- 8. The ---- trust model assumes each request as though it was originated from an uncontrolled network. Verify explicitly - assume breach
- 10. uses an algorithm to convert the original text to a unique fixed-length hash value
- 12. Microsoft is responsible for managing the physical hardware in their datacentres in a ------ responsibility model
- 14. A layer of the defence in depth policy where you would find DDoS protection and Firewall
- 15. This acronym allows users to reset their own passwords without involving the IT Service Desk
