Endpoint Protection Shared Responsibility Model VPN (Virtual Private Network) IAM (Identity and Access Management) Data Residency Issues Intrusion Detection System (IDS) Private Cloud Public Cloud Zero Trust Model DDoS Attack API Key Exposure Ephemeral Infrastructure CSPM (Cloud Security Posture Management) Security Group Misconfiguration Patch Management Cloud Misconfiguration Phishing Attempt Compliance Audit Key Management Service (KMS) Incident Response Plan Backup & Recovery Data Encryption at Rest Threat Intelligence Feed OAuth Token Hijacking Logging & Monitoring S3 Bucket Misconfiguration Cloud- native Security Tools Data Encryption in Transit Security by Design Network Segmentation Shadow IT Serverless Security Concerns Cloud Access Security Broker (CASB) Hybrid Cloud Ransomware in the Cloud MFA (Multi- Factor Authentication) VPC (Virtual Private Cloud) Least Privilege Principle Intrusion Prevention System (IPS) Container Vulnerabilities Endpoint Protection Shared Responsibility Model VPN (Virtual Private Network) IAM (Identity and Access Management) Data Residency Issues Intrusion Detection System (IDS) Private Cloud Public Cloud Zero Trust Model DDoS Attack API Key Exposure Ephemeral Infrastructure CSPM (Cloud Security Posture Management) Security Group Misconfiguration Patch Management Cloud Misconfiguration Phishing Attempt Compliance Audit Key Management Service (KMS) Incident Response Plan Backup & Recovery Data Encryption at Rest Threat Intelligence Feed OAuth Token Hijacking Logging & Monitoring S3 Bucket Misconfiguration Cloud- native Security Tools Data Encryption in Transit Security by Design Network Segmentation Shadow IT Serverless Security Concerns Cloud Access Security Broker (CASB) Hybrid Cloud Ransomware in the Cloud MFA (Multi- Factor Authentication) VPC (Virtual Private Cloud) Least Privilege Principle Intrusion Prevention System (IPS) Container Vulnerabilities
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Endpoint Protection
Shared Responsibility Model
VPN (Virtual Private Network)
IAM (Identity and Access Management)
Data Residency Issues
Intrusion Detection System (IDS)
Private Cloud
Public Cloud
Zero Trust Model
DDoS Attack
API Key Exposure
Ephemeral Infrastructure
CSPM (Cloud Security Posture Management)
Security Group Misconfiguration
Patch Management
Cloud Misconfiguration
Phishing Attempt
Compliance Audit
Key Management Service (KMS)
Incident Response Plan
Backup & Recovery
Data Encryption at Rest
Threat Intelligence Feed
OAuth Token Hijacking
Logging & Monitoring
S3 Bucket Misconfiguration
Cloud-native Security Tools
Data Encryption in Transit
Security by Design
Network Segmentation
Shadow IT
Serverless Security Concerns
Cloud Access Security Broker (CASB)
Hybrid Cloud
Ransomware in the Cloud
MFA (Multi-Factor Authentication)
VPC (Virtual Private Cloud)
Least Privilege Principle
Intrusion Prevention System (IPS)
Container Vulnerabilities