VPC (Virtual Private Cloud) Ransomware in the Cloud Shared Responsibility Model Backup & Recovery Security Group Misconfiguration Threat Intelligence Feed Container Vulnerabilities MFA (Multi- Factor Authentication) Compliance Audit Network Segmentation Phishing Attempt Cloud Misconfiguration Cloud- native Security Tools IAM (Identity and Access Management) Security by Design Ephemeral Infrastructure Data Residency Issues Zero Trust Model OAuth Token Hijacking Serverless Security Concerns Data Encryption at Rest Private Cloud Key Management Service (KMS) Patch Management Intrusion Detection System (IDS) API Key Exposure DDoS Attack Logging & Monitoring VPN (Virtual Private Network) Least Privilege Principle Endpoint Protection Shadow IT Data Encryption in Transit Intrusion Prevention System (IPS) Public Cloud CSPM (Cloud Security Posture Management) Hybrid Cloud Cloud Access Security Broker (CASB) Incident Response Plan S3 Bucket Misconfiguration VPC (Virtual Private Cloud) Ransomware in the Cloud Shared Responsibility Model Backup & Recovery Security Group Misconfiguration Threat Intelligence Feed Container Vulnerabilities MFA (Multi- Factor Authentication) Compliance Audit Network Segmentation Phishing Attempt Cloud Misconfiguration Cloud- native Security Tools IAM (Identity and Access Management) Security by Design Ephemeral Infrastructure Data Residency Issues Zero Trust Model OAuth Token Hijacking Serverless Security Concerns Data Encryption at Rest Private Cloud Key Management Service (KMS) Patch Management Intrusion Detection System (IDS) API Key Exposure DDoS Attack Logging & Monitoring VPN (Virtual Private Network) Least Privilege Principle Endpoint Protection Shadow IT Data Encryption in Transit Intrusion Prevention System (IPS) Public Cloud CSPM (Cloud Security Posture Management) Hybrid Cloud Cloud Access Security Broker (CASB) Incident Response Plan S3 Bucket Misconfiguration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
VPC (Virtual Private Cloud)
Ransomware in the Cloud
Shared Responsibility Model
Backup & Recovery
Security Group Misconfiguration
Threat Intelligence Feed
Container Vulnerabilities
MFA (Multi-Factor Authentication)
Compliance Audit
Network Segmentation
Phishing Attempt
Cloud Misconfiguration
Cloud-native Security Tools
IAM (Identity and Access Management)
Security by Design
Ephemeral Infrastructure
Data Residency Issues
Zero Trust Model
OAuth Token Hijacking
Serverless Security Concerns
Data Encryption at Rest
Private Cloud
Key Management Service (KMS)
Patch Management
Intrusion Detection System (IDS)
API Key Exposure
DDoS Attack
Logging & Monitoring
VPN (Virtual Private Network)
Least Privilege Principle
Endpoint Protection
Shadow IT
Data Encryption in Transit
Intrusion Prevention System (IPS)
Public Cloud
CSPM (Cloud Security Posture Management)
Hybrid Cloud
Cloud Access Security Broker (CASB)
Incident Response Plan
S3 Bucket Misconfiguration