IAM (Identity and Access Management) Public Cloud CSPM (Cloud Security Posture Management) OAuth Token Hijacking Zero Trust Model Logging & Monitoring Private Cloud Data Encryption in Transit Intrusion Prevention System (IPS) DDoS Attack Shared Responsibility Model Data Encryption at Rest Container Vulnerabilities Phishing Attempt Ephemeral Infrastructure Security by Design Patch Management Backup & Recovery Intrusion Detection System (IDS) Hybrid Cloud VPC (Virtual Private Cloud) Shadow IT Threat Intelligence Feed API Key Exposure Data Residency Issues Cloud Misconfiguration Compliance Audit Network Segmentation Cloud Access Security Broker (CASB) Ransomware in the Cloud Serverless Security Concerns VPN (Virtual Private Network) Key Management Service (KMS) Incident Response Plan Endpoint Protection Least Privilege Principle Cloud- native Security Tools S3 Bucket Misconfiguration MFA (Multi- Factor Authentication) Security Group Misconfiguration IAM (Identity and Access Management) Public Cloud CSPM (Cloud Security Posture Management) OAuth Token Hijacking Zero Trust Model Logging & Monitoring Private Cloud Data Encryption in Transit Intrusion Prevention System (IPS) DDoS Attack Shared Responsibility Model Data Encryption at Rest Container Vulnerabilities Phishing Attempt Ephemeral Infrastructure Security by Design Patch Management Backup & Recovery Intrusion Detection System (IDS) Hybrid Cloud VPC (Virtual Private Cloud) Shadow IT Threat Intelligence Feed API Key Exposure Data Residency Issues Cloud Misconfiguration Compliance Audit Network Segmentation Cloud Access Security Broker (CASB) Ransomware in the Cloud Serverless Security Concerns VPN (Virtual Private Network) Key Management Service (KMS) Incident Response Plan Endpoint Protection Least Privilege Principle Cloud- native Security Tools S3 Bucket Misconfiguration MFA (Multi- Factor Authentication) Security Group Misconfiguration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IAM (Identity and Access Management)
Public Cloud
CSPM (Cloud Security Posture Management)
OAuth Token Hijacking
Zero Trust Model
Logging & Monitoring
Private Cloud
Data Encryption in Transit
Intrusion Prevention System (IPS)
DDoS Attack
Shared Responsibility Model
Data Encryption at Rest
Container Vulnerabilities
Phishing Attempt
Ephemeral Infrastructure
Security by Design
Patch Management
Backup & Recovery
Intrusion Detection System (IDS)
Hybrid Cloud
VPC (Virtual Private Cloud)
Shadow IT
Threat Intelligence Feed
API Key Exposure
Data Residency Issues
Cloud Misconfiguration
Compliance Audit
Network Segmentation
Cloud Access Security Broker (CASB)
Ransomware in the Cloud
Serverless Security Concerns
VPN (Virtual Private Network)
Key Management Service (KMS)
Incident Response Plan
Endpoint Protection
Least Privilege Principle
Cloud-native Security Tools
S3 Bucket Misconfiguration
MFA (Multi-Factor Authentication)
Security Group Misconfiguration