(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Always use pre-approved data transfer channels when dealing with client’s or EPAM proprietary data
Never create a file on your computer to store your login information
Inject secrets via an environment variable into your app
Do not use browsers to store any kind of login information
Always use corporate tools such as MS Teams to share screenshots and video portal to share a videos
Do not publish EPAM or EPAM clients proprietary code to public repositories
Never store SSH keys and certificates in the same directories as their source code
Avoid sending passwords in email or chat
Never reuse your credentials
Never commit secrets (keys, password, certificates) to Git repositories
Do not ignore the security of test and development environments
To share information with a customer, use corporate FTP servers, which have been designed specifically for this purpose
Always use secrets management tools such as EPAM HashiCorp Vault
Do not store or share secret informationon public source code repositories, such as GitHub and Bitbucket
Use a password manager that securely stores and manages the passwords for your accounts and devices