ContainerVulnerabilitiesAPI KeyExposureZeroTrustModelCloudMisconfigurationKeyManagementService(KMS)DataEncryptionin TransitRansomwarein the CloudLogging &MonitoringServerlessSecurityConcernsMFA (Multi-FactorAuthentication)OAuthTokenHijackingSharedResponsibilityModelEphemeralInfrastructureDataEncryptionat RestPrivateCloudPatchManagementIntrusionDetectionSystem(IDS)PublicCloudThreatIntelligenceFeedCloudAccessSecurityBroker(CASB)ComplianceAuditDDoSAttackS3 BucketMisconfigurationIncidentResponsePlanNetworkSegmentationIAM (Identityand AccessManagement)IntrusionPreventionSystem(IPS)SecuritybyDesignLeastPrivilegePrincipleCloud-nativeSecurityToolsPhishingAttemptShadowITDataResidencyIssuesHybridCloudVPN(VirtualPrivateNetwork)EndpointProtectionCSPM (CloudSecurityPostureManagement)Backup&RecoveryVPC(VirtualPrivateCloud)Security GroupMisconfigurationContainerVulnerabilitiesAPI KeyExposureZeroTrustModelCloudMisconfigurationKeyManagementService(KMS)DataEncryptionin TransitRansomwarein the CloudLogging &MonitoringServerlessSecurityConcernsMFA (Multi-FactorAuthentication)OAuthTokenHijackingSharedResponsibilityModelEphemeralInfrastructureDataEncryptionat RestPrivateCloudPatchManagementIntrusionDetectionSystem(IDS)PublicCloudThreatIntelligenceFeedCloudAccessSecurityBroker(CASB)ComplianceAuditDDoSAttackS3 BucketMisconfigurationIncidentResponsePlanNetworkSegmentationIAM (Identityand AccessManagement)IntrusionPreventionSystem(IPS)SecuritybyDesignLeastPrivilegePrincipleCloud-nativeSecurityToolsPhishingAttemptShadowITDataResidencyIssuesHybridCloudVPN(VirtualPrivateNetwork)EndpointProtectionCSPM (CloudSecurityPostureManagement)Backup&RecoveryVPC(VirtualPrivateCloud)Security GroupMisconfiguration

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Container Vulnerabilities
  2. API Key Exposure
  3. Zero Trust Model
  4. Cloud Misconfiguration
  5. Key Management Service (KMS)
  6. Data Encryption in Transit
  7. Ransomware in the Cloud
  8. Logging & Monitoring
  9. Serverless Security Concerns
  10. MFA (Multi-Factor Authentication)
  11. OAuth Token Hijacking
  12. Shared Responsibility Model
  13. Ephemeral Infrastructure
  14. Data Encryption at Rest
  15. Private Cloud
  16. Patch Management
  17. Intrusion Detection System (IDS)
  18. Public Cloud
  19. Threat Intelligence Feed
  20. Cloud Access Security Broker (CASB)
  21. Compliance Audit
  22. DDoS Attack
  23. S3 Bucket Misconfiguration
  24. Incident Response Plan
  25. Network Segmentation
  26. IAM (Identity and Access Management)
  27. Intrusion Prevention System (IPS)
  28. Security by Design
  29. Least Privilege Principle
  30. Cloud-native Security Tools
  31. Phishing Attempt
  32. Shadow IT
  33. Data Residency Issues
  34. Hybrid Cloud
  35. VPN (Virtual Private Network)
  36. Endpoint Protection
  37. CSPM (Cloud Security Posture Management)
  38. Backup & Recovery
  39. VPC (Virtual Private Cloud)
  40. Security Group Misconfiguration