VPC(VirtualPrivateCloud)Ransomwarein the CloudSharedResponsibilityModelBackup&RecoverySecurity GroupMisconfigurationThreatIntelligenceFeedContainerVulnerabilitiesMFA (Multi-FactorAuthentication)ComplianceAuditNetworkSegmentationPhishingAttemptCloudMisconfigurationCloud-nativeSecurityToolsIAM (Identityand AccessManagement)SecuritybyDesignEphemeralInfrastructureDataResidencyIssuesZeroTrustModelOAuthTokenHijackingServerlessSecurityConcernsDataEncryptionat RestPrivateCloudKeyManagementService(KMS)PatchManagementIntrusionDetectionSystem(IDS)API KeyExposureDDoSAttackLogging &MonitoringVPN(VirtualPrivateNetwork)LeastPrivilegePrincipleEndpointProtectionShadowITDataEncryptionin TransitIntrusionPreventionSystem(IPS)PublicCloudCSPM (CloudSecurityPostureManagement)HybridCloudCloudAccessSecurityBroker(CASB)IncidentResponsePlanS3 BucketMisconfigurationVPC(VirtualPrivateCloud)Ransomwarein the CloudSharedResponsibilityModelBackup&RecoverySecurity GroupMisconfigurationThreatIntelligenceFeedContainerVulnerabilitiesMFA (Multi-FactorAuthentication)ComplianceAuditNetworkSegmentationPhishingAttemptCloudMisconfigurationCloud-nativeSecurityToolsIAM (Identityand AccessManagement)SecuritybyDesignEphemeralInfrastructureDataResidencyIssuesZeroTrustModelOAuthTokenHijackingServerlessSecurityConcernsDataEncryptionat RestPrivateCloudKeyManagementService(KMS)PatchManagementIntrusionDetectionSystem(IDS)API KeyExposureDDoSAttackLogging &MonitoringVPN(VirtualPrivateNetwork)LeastPrivilegePrincipleEndpointProtectionShadowITDataEncryptionin TransitIntrusionPreventionSystem(IPS)PublicCloudCSPM (CloudSecurityPostureManagement)HybridCloudCloudAccessSecurityBroker(CASB)IncidentResponsePlanS3 BucketMisconfiguration

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. VPC (Virtual Private Cloud)
  2. Ransomware in the Cloud
  3. Shared Responsibility Model
  4. Backup & Recovery
  5. Security Group Misconfiguration
  6. Threat Intelligence Feed
  7. Container Vulnerabilities
  8. MFA (Multi-Factor Authentication)
  9. Compliance Audit
  10. Network Segmentation
  11. Phishing Attempt
  12. Cloud Misconfiguration
  13. Cloud-native Security Tools
  14. IAM (Identity and Access Management)
  15. Security by Design
  16. Ephemeral Infrastructure
  17. Data Residency Issues
  18. Zero Trust Model
  19. OAuth Token Hijacking
  20. Serverless Security Concerns
  21. Data Encryption at Rest
  22. Private Cloud
  23. Key Management Service (KMS)
  24. Patch Management
  25. Intrusion Detection System (IDS)
  26. API Key Exposure
  27. DDoS Attack
  28. Logging & Monitoring
  29. VPN (Virtual Private Network)
  30. Least Privilege Principle
  31. Endpoint Protection
  32. Shadow IT
  33. Data Encryption in Transit
  34. Intrusion Prevention System (IPS)
  35. Public Cloud
  36. CSPM (Cloud Security Posture Management)
  37. Hybrid Cloud
  38. Cloud Access Security Broker (CASB)
  39. Incident Response Plan
  40. S3 Bucket Misconfiguration