Zero-Trust

1234567891011
Across
  1. 2. Zero Trust eliminates ___ ports to reduce attack surface.
  2. 6. – Zero Trust enforces least ___ access to minimize risk.
  3. 7. Every session in a Zero Trust model must be fully ___.
  4. 9. OT compliance standard Secomea adheres to (abbr.).
  5. 10. A secure remote access company built for OT.
  6. 11. Traffic allowed in Zero Trust: ___-only.
Down
  1. 1. Access should only be granted when it is scheduled and ___.
  2. 3. – What Zero Trust replaces: ___ perimeter security.
  3. 4. All users and devices must be continuously ___.
  4. 5. European directive Secomea helps manufacturers comply with (abbr.).
  5. 8. This cybersecurity model assumes no inherent trust: Zero ___.