Key Management Service (KMS) Ransomware in the Cloud MFA (Multi- Factor Authentication) Shadow IT Data Encryption in Transit Private Cloud Cloud Access Security Broker (CASB) Serverless Security Concerns Compliance Audit Public Cloud Network Segmentation Ephemeral Infrastructure IAM (Identity and Access Management) Data Residency Issues Logging & Monitoring VPN (Virtual Private Network) Zero Trust Model Intrusion Prevention System (IPS) S3 Bucket Misconfiguration CSPM (Cloud Security Posture Management) DDoS Attack Least Privilege Principle Backup & Recovery API Key Exposure Intrusion Detection System (IDS) Cloud- native Security Tools Threat Intelligence Feed Incident Response Plan Security by Design Endpoint Protection Phishing Attempt Shared Responsibility Model Container Vulnerabilities OAuth Token Hijacking Patch Management Cloud Misconfiguration Security Group Misconfiguration VPC (Virtual Private Cloud) Data Encryption at Rest Hybrid Cloud Key Management Service (KMS) Ransomware in the Cloud MFA (Multi- Factor Authentication) Shadow IT Data Encryption in Transit Private Cloud Cloud Access Security Broker (CASB) Serverless Security Concerns Compliance Audit Public Cloud Network Segmentation Ephemeral Infrastructure IAM (Identity and Access Management) Data Residency Issues Logging & Monitoring VPN (Virtual Private Network) Zero Trust Model Intrusion Prevention System (IPS) S3 Bucket Misconfiguration CSPM (Cloud Security Posture Management) DDoS Attack Least Privilege Principle Backup & Recovery API Key Exposure Intrusion Detection System (IDS) Cloud- native Security Tools Threat Intelligence Feed Incident Response Plan Security by Design Endpoint Protection Phishing Attempt Shared Responsibility Model Container Vulnerabilities OAuth Token Hijacking Patch Management Cloud Misconfiguration Security Group Misconfiguration VPC (Virtual Private Cloud) Data Encryption at Rest Hybrid Cloud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Key Management Service (KMS)
Ransomware in the Cloud
MFA (Multi-Factor Authentication)
Shadow IT
Data Encryption in Transit
Private Cloud
Cloud Access Security Broker (CASB)
Serverless Security Concerns
Compliance Audit
Public Cloud
Network Segmentation
Ephemeral Infrastructure
IAM (Identity and Access Management)
Data Residency Issues
Logging & Monitoring
VPN (Virtual Private Network)
Zero Trust Model
Intrusion Prevention System (IPS)
S3 Bucket Misconfiguration
CSPM (Cloud Security Posture Management)
DDoS Attack
Least Privilege Principle
Backup & Recovery
API Key Exposure
Intrusion Detection System (IDS)
Cloud-native Security Tools
Threat Intelligence Feed
Incident Response Plan
Security by Design
Endpoint Protection
Phishing Attempt
Shared Responsibility Model
Container Vulnerabilities
OAuth Token Hijacking
Patch Management
Cloud Misconfiguration
Security Group Misconfiguration
VPC (Virtual Private Cloud)
Data Encryption at Rest
Hybrid Cloud