VPC (Virtual Private Cloud) OAuth Token Hijacking Endpoint Protection Cloud Misconfiguration Data Residency Issues Least Privilege Principle Shadow IT Private Cloud Intrusion Detection System (IDS) Incident Response Plan S3 Bucket Misconfiguration Backup & Recovery Compliance Audit Ransomware in the Cloud Threat Intelligence Feed VPN (Virtual Private Network) Shared Responsibility Model Ephemeral Infrastructure Network Segmentation Data Encryption in Transit Logging & Monitoring Security Group Misconfiguration Patch Management Zero Trust Model Data Encryption at Rest Key Management Service (KMS) Container Vulnerabilities Cloud- native Security Tools Serverless Security Concerns Phishing Attempt DDoS Attack IAM (Identity and Access Management) MFA (Multi- Factor Authentication) API Key Exposure Security by Design CSPM (Cloud Security Posture Management) Public Cloud Cloud Access Security Broker (CASB) Intrusion Prevention System (IPS) Hybrid Cloud VPC (Virtual Private Cloud) OAuth Token Hijacking Endpoint Protection Cloud Misconfiguration Data Residency Issues Least Privilege Principle Shadow IT Private Cloud Intrusion Detection System (IDS) Incident Response Plan S3 Bucket Misconfiguration Backup & Recovery Compliance Audit Ransomware in the Cloud Threat Intelligence Feed VPN (Virtual Private Network) Shared Responsibility Model Ephemeral Infrastructure Network Segmentation Data Encryption in Transit Logging & Monitoring Security Group Misconfiguration Patch Management Zero Trust Model Data Encryption at Rest Key Management Service (KMS) Container Vulnerabilities Cloud- native Security Tools Serverless Security Concerns Phishing Attempt DDoS Attack IAM (Identity and Access Management) MFA (Multi- Factor Authentication) API Key Exposure Security by Design CSPM (Cloud Security Posture Management) Public Cloud Cloud Access Security Broker (CASB) Intrusion Prevention System (IPS) Hybrid Cloud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPC (Virtual Private Cloud)
OAuth Token Hijacking
Endpoint Protection
Cloud Misconfiguration
Data Residency Issues
Least Privilege Principle
Shadow IT
Private Cloud
Intrusion Detection System (IDS)
Incident Response Plan
S3 Bucket Misconfiguration
Backup & Recovery
Compliance Audit
Ransomware in the Cloud
Threat Intelligence Feed
VPN (Virtual Private Network)
Shared Responsibility Model
Ephemeral Infrastructure
Network Segmentation
Data Encryption in Transit
Logging & Monitoring
Security Group Misconfiguration
Patch Management
Zero Trust Model
Data Encryption at Rest
Key Management Service (KMS)
Container Vulnerabilities
Cloud-native Security Tools
Serverless Security Concerns
Phishing Attempt
DDoS Attack
IAM (Identity and Access Management)
MFA (Multi-Factor Authentication)
API Key Exposure
Security by Design
CSPM (Cloud Security Posture Management)
Public Cloud
Cloud Access Security Broker (CASB)
Intrusion Prevention System (IPS)
Hybrid Cloud