IAM (Identityand AccessManagement)PublicCloudCSPM (CloudSecurityPostureManagement)OAuthTokenHijackingZeroTrustModelLogging &MonitoringPrivateCloudDataEncryptionin TransitIntrusionPreventionSystem(IPS)DDoSAttackSharedResponsibilityModelDataEncryptionat RestContainerVulnerabilitiesPhishingAttemptEphemeralInfrastructureSecuritybyDesignPatchManagementBackup&RecoveryIntrusionDetectionSystem(IDS)HybridCloudVPC(VirtualPrivateCloud)ShadowITThreatIntelligenceFeedAPI KeyExposureDataResidencyIssuesCloudMisconfigurationComplianceAuditNetworkSegmentationCloudAccessSecurityBroker(CASB)Ransomwarein the CloudServerlessSecurityConcernsVPN(VirtualPrivateNetwork)KeyManagementService(KMS)IncidentResponsePlanEndpointProtectionLeastPrivilegePrincipleCloud-nativeSecurityToolsS3 BucketMisconfigurationMFA (Multi-FactorAuthentication)Security GroupMisconfigurationIAM (Identityand AccessManagement)PublicCloudCSPM (CloudSecurityPostureManagement)OAuthTokenHijackingZeroTrustModelLogging &MonitoringPrivateCloudDataEncryptionin TransitIntrusionPreventionSystem(IPS)DDoSAttackSharedResponsibilityModelDataEncryptionat RestContainerVulnerabilitiesPhishingAttemptEphemeralInfrastructureSecuritybyDesignPatchManagementBackup&RecoveryIntrusionDetectionSystem(IDS)HybridCloudVPC(VirtualPrivateCloud)ShadowITThreatIntelligenceFeedAPI KeyExposureDataResidencyIssuesCloudMisconfigurationComplianceAuditNetworkSegmentationCloudAccessSecurityBroker(CASB)Ransomwarein the CloudServerlessSecurityConcernsVPN(VirtualPrivateNetwork)KeyManagementService(KMS)IncidentResponsePlanEndpointProtectionLeastPrivilegePrincipleCloud-nativeSecurityToolsS3 BucketMisconfigurationMFA (Multi-FactorAuthentication)Security GroupMisconfiguration

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. IAM (Identity and Access Management)
  2. Public Cloud
  3. CSPM (Cloud Security Posture Management)
  4. OAuth Token Hijacking
  5. Zero Trust Model
  6. Logging & Monitoring
  7. Private Cloud
  8. Data Encryption in Transit
  9. Intrusion Prevention System (IPS)
  10. DDoS Attack
  11. Shared Responsibility Model
  12. Data Encryption at Rest
  13. Container Vulnerabilities
  14. Phishing Attempt
  15. Ephemeral Infrastructure
  16. Security by Design
  17. Patch Management
  18. Backup & Recovery
  19. Intrusion Detection System (IDS)
  20. Hybrid Cloud
  21. VPC (Virtual Private Cloud)
  22. Shadow IT
  23. Threat Intelligence Feed
  24. API Key Exposure
  25. Data Residency Issues
  26. Cloud Misconfiguration
  27. Compliance Audit
  28. Network Segmentation
  29. Cloud Access Security Broker (CASB)
  30. Ransomware in the Cloud
  31. Serverless Security Concerns
  32. VPN (Virtual Private Network)
  33. Key Management Service (KMS)
  34. Incident Response Plan
  35. Endpoint Protection
  36. Least Privilege Principle
  37. Cloud-native Security Tools
  38. S3 Bucket Misconfiguration
  39. MFA (Multi-Factor Authentication)
  40. Security Group Misconfiguration