KeyManagementService(KMS)Ransomwarein the CloudMFA (Multi-FactorAuthentication)ShadowITDataEncryptionin TransitPrivateCloudCloudAccessSecurityBroker(CASB)ServerlessSecurityConcernsComplianceAuditPublicCloudNetworkSegmentationEphemeralInfrastructureIAM (Identityand AccessManagement)DataResidencyIssuesLogging &MonitoringVPN(VirtualPrivateNetwork)ZeroTrustModelIntrusionPreventionSystem(IPS)S3 BucketMisconfigurationCSPM (CloudSecurityPostureManagement)DDoSAttackLeastPrivilegePrincipleBackup&RecoveryAPI KeyExposureIntrusionDetectionSystem(IDS)Cloud-nativeSecurityToolsThreatIntelligenceFeedIncidentResponsePlanSecuritybyDesignEndpointProtectionPhishingAttemptSharedResponsibilityModelContainerVulnerabilitiesOAuthTokenHijackingPatchManagementCloudMisconfigurationSecurity GroupMisconfigurationVPC(VirtualPrivateCloud)DataEncryptionat RestHybridCloudKeyManagementService(KMS)Ransomwarein the CloudMFA (Multi-FactorAuthentication)ShadowITDataEncryptionin TransitPrivateCloudCloudAccessSecurityBroker(CASB)ServerlessSecurityConcernsComplianceAuditPublicCloudNetworkSegmentationEphemeralInfrastructureIAM (Identityand AccessManagement)DataResidencyIssuesLogging &MonitoringVPN(VirtualPrivateNetwork)ZeroTrustModelIntrusionPreventionSystem(IPS)S3 BucketMisconfigurationCSPM (CloudSecurityPostureManagement)DDoSAttackLeastPrivilegePrincipleBackup&RecoveryAPI KeyExposureIntrusionDetectionSystem(IDS)Cloud-nativeSecurityToolsThreatIntelligenceFeedIncidentResponsePlanSecuritybyDesignEndpointProtectionPhishingAttemptSharedResponsibilityModelContainerVulnerabilitiesOAuthTokenHijackingPatchManagementCloudMisconfigurationSecurity GroupMisconfigurationVPC(VirtualPrivateCloud)DataEncryptionat RestHybridCloud

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Key Management Service (KMS)
  2. Ransomware in the Cloud
  3. MFA (Multi-Factor Authentication)
  4. Shadow IT
  5. Data Encryption in Transit
  6. Private Cloud
  7. Cloud Access Security Broker (CASB)
  8. Serverless Security Concerns
  9. Compliance Audit
  10. Public Cloud
  11. Network Segmentation
  12. Ephemeral Infrastructure
  13. IAM (Identity and Access Management)
  14. Data Residency Issues
  15. Logging & Monitoring
  16. VPN (Virtual Private Network)
  17. Zero Trust Model
  18. Intrusion Prevention System (IPS)
  19. S3 Bucket Misconfiguration
  20. CSPM (Cloud Security Posture Management)
  21. DDoS Attack
  22. Least Privilege Principle
  23. Backup & Recovery
  24. API Key Exposure
  25. Intrusion Detection System (IDS)
  26. Cloud-native Security Tools
  27. Threat Intelligence Feed
  28. Incident Response Plan
  29. Security by Design
  30. Endpoint Protection
  31. Phishing Attempt
  32. Shared Responsibility Model
  33. Container Vulnerabilities
  34. OAuth Token Hijacking
  35. Patch Management
  36. Cloud Misconfiguration
  37. Security Group Misconfiguration
  38. VPC (Virtual Private Cloud)
  39. Data Encryption at Rest
  40. Hybrid Cloud