API KeyExposureLogging &MonitoringDataResidencyIssuesVPC(VirtualPrivateCloud)VPN(VirtualPrivateNetwork)S3 BucketMisconfigurationShadowITMFA (Multi-FactorAuthentication)SharedResponsibilityModelCloud-nativeSecurityToolsNetworkSegmentationCloudAccessSecurityBroker(CASB)PatchManagementServerlessSecurityConcernsLeastPrivilegePrinciplePrivateCloudIncidentResponsePlanThreatIntelligenceFeedIntrusionDetectionSystem(IDS)PublicCloudDDoSAttackDataEncryptionat RestPhishingAttemptOAuthTokenHijackingBackup&RecoveryCSPM (CloudSecurityPostureManagement)SecuritybyDesignIntrusionPreventionSystem(IPS)HybridCloudZeroTrustModelRansomwarein the CloudEphemeralInfrastructureKeyManagementService(KMS)ContainerVulnerabilitiesEndpointProtectionIAM (Identityand AccessManagement)CloudMisconfigurationDataEncryptionin TransitSecurity GroupMisconfigurationComplianceAuditAPI KeyExposureLogging &MonitoringDataResidencyIssuesVPC(VirtualPrivateCloud)VPN(VirtualPrivateNetwork)S3 BucketMisconfigurationShadowITMFA (Multi-FactorAuthentication)SharedResponsibilityModelCloud-nativeSecurityToolsNetworkSegmentationCloudAccessSecurityBroker(CASB)PatchManagementServerlessSecurityConcernsLeastPrivilegePrinciplePrivateCloudIncidentResponsePlanThreatIntelligenceFeedIntrusionDetectionSystem(IDS)PublicCloudDDoSAttackDataEncryptionat RestPhishingAttemptOAuthTokenHijackingBackup&RecoveryCSPM (CloudSecurityPostureManagement)SecuritybyDesignIntrusionPreventionSystem(IPS)HybridCloudZeroTrustModelRansomwarein the CloudEphemeralInfrastructureKeyManagementService(KMS)ContainerVulnerabilitiesEndpointProtectionIAM (Identityand AccessManagement)CloudMisconfigurationDataEncryptionin TransitSecurity GroupMisconfigurationComplianceAudit

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. API Key Exposure
  2. Logging & Monitoring
  3. Data Residency Issues
  4. VPC (Virtual Private Cloud)
  5. VPN (Virtual Private Network)
  6. S3 Bucket Misconfiguration
  7. Shadow IT
  8. MFA (Multi-Factor Authentication)
  9. Shared Responsibility Model
  10. Cloud-native Security Tools
  11. Network Segmentation
  12. Cloud Access Security Broker (CASB)
  13. Patch Management
  14. Serverless Security Concerns
  15. Least Privilege Principle
  16. Private Cloud
  17. Incident Response Plan
  18. Threat Intelligence Feed
  19. Intrusion Detection System (IDS)
  20. Public Cloud
  21. DDoS Attack
  22. Data Encryption at Rest
  23. Phishing Attempt
  24. OAuth Token Hijacking
  25. Backup & Recovery
  26. CSPM (Cloud Security Posture Management)
  27. Security by Design
  28. Intrusion Prevention System (IPS)
  29. Hybrid Cloud
  30. Zero Trust Model
  31. Ransomware in the Cloud
  32. Ephemeral Infrastructure
  33. Key Management Service (KMS)
  34. Container Vulnerabilities
  35. Endpoint Protection
  36. IAM (Identity and Access Management)
  37. Cloud Misconfiguration
  38. Data Encryption in Transit
  39. Security Group Misconfiguration
  40. Compliance Audit