Shadow IT Serverless Security Concerns Network Segmentation MFA (Multi- Factor Authentication) Incident Response Plan Ephemeral Infrastructure Intrusion Prevention System (IPS) Compliance Audit Shared Responsibility Model Phishing Attempt Patch Management Container Vulnerabilities Ransomware in the Cloud Hybrid Cloud Endpoint Protection Cloud Misconfiguration Logging & Monitoring CSPM (Cloud Security Posture Management) Security by Design Data Residency Issues DDoS Attack Private Cloud IAM (Identity and Access Management) Intrusion Detection System (IDS) API Key Exposure Threat Intelligence Feed OAuth Token Hijacking VPN (Virtual Private Network) Cloud- native Security Tools Zero Trust Model S3 Bucket Misconfiguration Data Encryption at Rest Least Privilege Principle Public Cloud Backup & Recovery VPC (Virtual Private Cloud) Security Group Misconfiguration Key Management Service (KMS) Cloud Access Security Broker (CASB) Data Encryption in Transit Shadow IT Serverless Security Concerns Network Segmentation MFA (Multi- Factor Authentication) Incident Response Plan Ephemeral Infrastructure Intrusion Prevention System (IPS) Compliance Audit Shared Responsibility Model Phishing Attempt Patch Management Container Vulnerabilities Ransomware in the Cloud Hybrid Cloud Endpoint Protection Cloud Misconfiguration Logging & Monitoring CSPM (Cloud Security Posture Management) Security by Design Data Residency Issues DDoS Attack Private Cloud IAM (Identity and Access Management) Intrusion Detection System (IDS) API Key Exposure Threat Intelligence Feed OAuth Token Hijacking VPN (Virtual Private Network) Cloud- native Security Tools Zero Trust Model S3 Bucket Misconfiguration Data Encryption at Rest Least Privilege Principle Public Cloud Backup & Recovery VPC (Virtual Private Cloud) Security Group Misconfiguration Key Management Service (KMS) Cloud Access Security Broker (CASB) Data Encryption in Transit
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Shadow IT
Serverless Security Concerns
Network Segmentation
MFA (Multi-Factor Authentication)
Incident Response Plan
Ephemeral Infrastructure
Intrusion Prevention System (IPS)
Compliance Audit
Shared Responsibility Model
Phishing Attempt
Patch Management
Container Vulnerabilities
Ransomware in the Cloud
Hybrid Cloud
Endpoint Protection
Cloud Misconfiguration
Logging & Monitoring
CSPM (Cloud Security Posture Management)
Security by Design
Data Residency Issues
DDoS Attack
Private Cloud
IAM (Identity and Access Management)
Intrusion Detection System (IDS)
API Key Exposure
Threat Intelligence Feed
OAuth Token Hijacking
VPN (Virtual Private Network)
Cloud-native Security Tools
Zero Trust Model
S3 Bucket Misconfiguration
Data Encryption at Rest
Least Privilege Principle
Public Cloud
Backup & Recovery
VPC (Virtual Private Cloud)
Security Group Misconfiguration
Key Management Service (KMS)
Cloud Access Security Broker (CASB)
Data Encryption in Transit