Across
- 2. I copy traffic for you to safely inspect. (6,9)
- 3. If you look at me you can find out "who did what, where, and when". (5,5,4)
- 5. You're not alone and this approach helps reduce risk and cost. (6)
- 7. Enterprise way to adopt a Zero trust approach. (6,4)
- 8. Use me to prevent unwanted traffic reaching your VMs. (8)
- 9. Use me to Store API keys, passwords, certificates, and other sensitive data. (6,7)
- 13. Use me to classify your data. (5,3)
- 14. I provide insights into your security posture. Acronym(3)
- 16. De-identification technique. (16)
- 17. I detect network based threats. (5,3)
- 18. Do you trust that container image? (6,4)
- 21. Trust no one. (4,5)
- 22. Using me allows you to implment the principle of least privilege. Acronym (3)
Down
- 1. I can tell you when you need to reduce permissions. (11)
- 4. I am Google's Security Analytics Platform and I help you continually analyse your security telemetry data. (9)
- 6. Apply multiple layers of securty. (7,2,5)
- 10. Use me to mitigate OWASP top 10 risks. (5,5)
- 11. Needs to be kept secret. (12)
- 12. If you use me you do not need a VPN. Acronym(3)
- 15. You can find me at rest or on the move (in-transit). (10)
- 19. If you want to confidently meet your compliance & sovereign requirements, this is the workload you should be looking at. (7)
- 20. Use me to manage keys outside of Google Cloud. Acronym (3)
