IAM (Identity and Access Management) Public Cloud Hybrid Cloud Intrusion Detection System (IDS) Backup & Recovery Ephemeral Infrastructure Shared Responsibility Model OAuth Token Hijacking S3 Bucket Misconfiguration Intrusion Prevention System (IPS) MFA (Multi- Factor Authentication) Container Vulnerabilities Cloud Misconfiguration DDoS Attack Private Cloud Key Management Service (KMS) Compliance Audit Logging & Monitoring Ransomware in the Cloud Data Encryption at Rest Shadow IT VPC (Virtual Private Cloud) API Key Exposure Serverless Security Concerns Patch Management Cloud Access Security Broker (CASB) Data Residency Issues Network Segmentation Data Encryption in Transit Phishing Attempt Endpoint Protection VPN (Virtual Private Network) CSPM (Cloud Security Posture Management) Security by Design Least Privilege Principle Threat Intelligence Feed Zero Trust Model Incident Response Plan Cloud- native Security Tools Security Group Misconfiguration IAM (Identity and Access Management) Public Cloud Hybrid Cloud Intrusion Detection System (IDS) Backup & Recovery Ephemeral Infrastructure Shared Responsibility Model OAuth Token Hijacking S3 Bucket Misconfiguration Intrusion Prevention System (IPS) MFA (Multi- Factor Authentication) Container Vulnerabilities Cloud Misconfiguration DDoS Attack Private Cloud Key Management Service (KMS) Compliance Audit Logging & Monitoring Ransomware in the Cloud Data Encryption at Rest Shadow IT VPC (Virtual Private Cloud) API Key Exposure Serverless Security Concerns Patch Management Cloud Access Security Broker (CASB) Data Residency Issues Network Segmentation Data Encryption in Transit Phishing Attempt Endpoint Protection VPN (Virtual Private Network) CSPM (Cloud Security Posture Management) Security by Design Least Privilege Principle Threat Intelligence Feed Zero Trust Model Incident Response Plan Cloud- native Security Tools Security Group Misconfiguration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
IAM (Identity and Access Management)
Public Cloud
Hybrid Cloud
Intrusion Detection System (IDS)
Backup & Recovery
Ephemeral Infrastructure
Shared Responsibility Model
OAuth Token Hijacking
S3 Bucket Misconfiguration
Intrusion Prevention System (IPS)
MFA (Multi-Factor Authentication)
Container Vulnerabilities
Cloud Misconfiguration
DDoS Attack
Private Cloud
Key Management Service (KMS)
Compliance Audit
Logging & Monitoring
Ransomware in the Cloud
Data Encryption at Rest
Shadow IT
VPC (Virtual Private Cloud)
API Key Exposure
Serverless Security Concerns
Patch Management
Cloud Access Security Broker (CASB)
Data Residency Issues
Network Segmentation
Data Encryption in Transit
Phishing Attempt
Endpoint Protection
VPN (Virtual Private Network)
CSPM (Cloud Security Posture Management)
Security by Design
Least Privilege Principle
Threat Intelligence Feed
Zero Trust Model
Incident Response Plan
Cloud-native Security Tools
Security Group Misconfiguration