(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
C6:2018-Implement Digital Identity
A9:2017-Using Components with Known Vulnerabilities
C10:2018-Handle all Errors and Exceptions
A2:2013-Broken Authentication and Session Management
C1:2018-Define Security Requirements
A8:2013-Cross-Site Request Forgery (CSRF)
C9:2018-Implement Security Logging and Monitoring
A4:2017-XML External Entities (XXE)
A2:2017-Broken Authentication
A5:2013-Security Misconfiguration
A7:2013-Missing Function Level Access Control
C4:2018-Encode and Escape Data
C5:2018-Validate All Inputs
A1:2017-Injection
A1:2013-Injection
C3:2018-Secure Database Access
A7:2017-Cross-Site Scripting (XSS)
A9:2013-Using Components with Known Vulnerabilities
A6:2017-Security Misconfiguration
A3:2017-Sensitive Data Exposure
A3:2013-Cross-Site Scripting (XSS)
A5:2017-Broken Access Control
A6:2013-Sensitive Data Exposure
A10:2017-Insufficient Logging & Monitoring
C7:2018-Enforce Access Controls
A10:2013-Unvalidated Redirects and Forwards
A8:2017-Insecure Deserialization
C8:2018-Protect Data Everywhere
A4:2013-Insecure Direct Object References
C2:2018-Leverage Security Frameworks and Libraries