API Key Exposure Logging & Monitoring Data Residency Issues VPC (Virtual Private Cloud) VPN (Virtual Private Network) S3 Bucket Misconfiguration Shadow IT MFA (Multi- Factor Authentication) Shared Responsibility Model Cloud- native Security Tools Network Segmentation Cloud Access Security Broker (CASB) Patch Management Serverless Security Concerns Least Privilege Principle Private Cloud Incident Response Plan Threat Intelligence Feed Intrusion Detection System (IDS) Public Cloud DDoS Attack Data Encryption at Rest Phishing Attempt OAuth Token Hijacking Backup & Recovery CSPM (Cloud Security Posture Management) Security by Design Intrusion Prevention System (IPS) Hybrid Cloud Zero Trust Model Ransomware in the Cloud Ephemeral Infrastructure Key Management Service (KMS) Container Vulnerabilities Endpoint Protection IAM (Identity and Access Management) Cloud Misconfiguration Data Encryption in Transit Security Group Misconfiguration Compliance Audit API Key Exposure Logging & Monitoring Data Residency Issues VPC (Virtual Private Cloud) VPN (Virtual Private Network) S3 Bucket Misconfiguration Shadow IT MFA (Multi- Factor Authentication) Shared Responsibility Model Cloud- native Security Tools Network Segmentation Cloud Access Security Broker (CASB) Patch Management Serverless Security Concerns Least Privilege Principle Private Cloud Incident Response Plan Threat Intelligence Feed Intrusion Detection System (IDS) Public Cloud DDoS Attack Data Encryption at Rest Phishing Attempt OAuth Token Hijacking Backup & Recovery CSPM (Cloud Security Posture Management) Security by Design Intrusion Prevention System (IPS) Hybrid Cloud Zero Trust Model Ransomware in the Cloud Ephemeral Infrastructure Key Management Service (KMS) Container Vulnerabilities Endpoint Protection IAM (Identity and Access Management) Cloud Misconfiguration Data Encryption in Transit Security Group Misconfiguration Compliance Audit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
API Key Exposure
Logging & Monitoring
Data Residency Issues
VPC (Virtual Private Cloud)
VPN (Virtual Private Network)
S3 Bucket Misconfiguration
Shadow IT
MFA (Multi-Factor Authentication)
Shared Responsibility Model
Cloud-native Security Tools
Network Segmentation
Cloud Access Security Broker (CASB)
Patch Management
Serverless Security Concerns
Least Privilege Principle
Private Cloud
Incident Response Plan
Threat Intelligence Feed
Intrusion Detection System (IDS)
Public Cloud
DDoS Attack
Data Encryption at Rest
Phishing Attempt
OAuth Token Hijacking
Backup & Recovery
CSPM (Cloud Security Posture Management)
Security by Design
Intrusion Prevention System (IPS)
Hybrid Cloud
Zero Trust Model
Ransomware in the Cloud
Ephemeral Infrastructure
Key Management Service (KMS)
Container Vulnerabilities
Endpoint Protection
IAM (Identity and Access Management)
Cloud Misconfiguration
Data Encryption in Transit
Security Group Misconfiguration
Compliance Audit