Security Group Misconfiguration IAM (Identity and Access Management) OAuth Token Hijacking API Key Exposure Ransomware in the Cloud Shared Responsibility Model DDoS Attack Ephemeral Infrastructure Threat Intelligence Feed S3 Bucket Misconfiguration Phishing Attempt Data Encryption at Rest Data Encryption in Transit Compliance Audit Cloud- native Security Tools Data Residency Issues Hybrid Cloud Serverless Security Concerns Private Cloud Security by Design Intrusion Detection System (IDS) Network Segmentation MFA (Multi- Factor Authentication) VPN (Virtual Private Network) Zero Trust Model VPC (Virtual Private Cloud) Container Vulnerabilities Endpoint Protection Logging & Monitoring Least Privilege Principle CSPM (Cloud Security Posture Management) Intrusion Prevention System (IPS) Patch Management Cloud Access Security Broker (CASB) Cloud Misconfiguration Incident Response Plan Backup & Recovery Shadow IT Public Cloud Key Management Service (KMS) Security Group Misconfiguration IAM (Identity and Access Management) OAuth Token Hijacking API Key Exposure Ransomware in the Cloud Shared Responsibility Model DDoS Attack Ephemeral Infrastructure Threat Intelligence Feed S3 Bucket Misconfiguration Phishing Attempt Data Encryption at Rest Data Encryption in Transit Compliance Audit Cloud- native Security Tools Data Residency Issues Hybrid Cloud Serverless Security Concerns Private Cloud Security by Design Intrusion Detection System (IDS) Network Segmentation MFA (Multi- Factor Authentication) VPN (Virtual Private Network) Zero Trust Model VPC (Virtual Private Cloud) Container Vulnerabilities Endpoint Protection Logging & Monitoring Least Privilege Principle CSPM (Cloud Security Posture Management) Intrusion Prevention System (IPS) Patch Management Cloud Access Security Broker (CASB) Cloud Misconfiguration Incident Response Plan Backup & Recovery Shadow IT Public Cloud Key Management Service (KMS)
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security Group Misconfiguration
IAM (Identity and Access Management)
OAuth Token Hijacking
API Key Exposure
Ransomware in the Cloud
Shared Responsibility Model
DDoS Attack
Ephemeral Infrastructure
Threat Intelligence Feed
S3 Bucket Misconfiguration
Phishing Attempt
Data Encryption at Rest
Data Encryption in Transit
Compliance Audit
Cloud-native Security Tools
Data Residency Issues
Hybrid Cloud
Serverless Security Concerns
Private Cloud
Security by Design
Intrusion Detection System (IDS)
Network Segmentation
MFA (Multi-Factor Authentication)
VPN (Virtual Private Network)
Zero Trust Model
VPC (Virtual Private Cloud)
Container Vulnerabilities
Endpoint Protection
Logging & Monitoring
Least Privilege Principle
CSPM (Cloud Security Posture Management)
Intrusion Prevention System (IPS)
Patch Management
Cloud Access Security Broker (CASB)
Cloud Misconfiguration
Incident Response Plan
Backup & Recovery
Shadow IT
Public Cloud
Key Management Service (KMS)