Security

12345678910111213141516171819202122
Across
  1. 2. I copy traffic for you to safely inspect. (6,9)
  2. 3. If you look at me you can find out "who did what, where, and when". (5,5,4)
  3. 5. You're not alone and this approach helps reduce risk and cost. (6)
  4. 7. Enterprise way to adopt a Zero trust approach. (6,4)
  5. 8. Use me to prevent unwanted traffic reaching your VMs. (8)
  6. 9. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
  7. 13. Use me to classify your data. (5,3)
  8. 14. I provide insights into your security posture. Acronym(3)
  9. 16. De-identification technique. (16)
  10. 17. I detect network based threats. (5,3)
  11. 18. Do you trust that container image? (6,4)
  12. 21. Trust no one. (4,5)
  13. 22. Using me allows you to implment the principle of least privilege. Acronym (3)
Down
  1. 1. I can tell you when you need to reduce permissions. (11)
  2. 4. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
  3. 6. Apply multiple layers of securty. (7,2,5)
  4. 10. Use me to mitigate OWASP top 10 risks. (5,5)
  5. 11. Needs to be kept secret. (12)
  6. 12. If you use me you do not need a VPN. Acronym(3)
  7. 15. You can find me at rest or on the move (in-transit). (10)
  8. 19. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
  9. 20. Use me to manage keys outside of Google Cloud. Acronym (3)