VPC(VirtualPrivateCloud)OAuthTokenHijackingEndpointProtectionCloudMisconfigurationDataResidencyIssuesLeastPrivilegePrincipleShadowITPrivateCloudIntrusionDetectionSystem(IDS)IncidentResponsePlanS3 BucketMisconfigurationBackup&RecoveryComplianceAuditRansomwarein the CloudThreatIntelligenceFeedVPN(VirtualPrivateNetwork)SharedResponsibilityModelEphemeralInfrastructureNetworkSegmentationDataEncryptionin TransitLogging &MonitoringSecurity GroupMisconfigurationPatchManagementZeroTrustModelDataEncryptionat RestKeyManagementService(KMS)ContainerVulnerabilitiesCloud-nativeSecurityToolsServerlessSecurityConcernsPhishingAttemptDDoSAttackIAM (Identityand AccessManagement)MFA (Multi-FactorAuthentication)API KeyExposureSecuritybyDesignCSPM (CloudSecurityPostureManagement)PublicCloudCloudAccessSecurityBroker(CASB)IntrusionPreventionSystem(IPS)HybridCloudVPC(VirtualPrivateCloud)OAuthTokenHijackingEndpointProtectionCloudMisconfigurationDataResidencyIssuesLeastPrivilegePrincipleShadowITPrivateCloudIntrusionDetectionSystem(IDS)IncidentResponsePlanS3 BucketMisconfigurationBackup&RecoveryComplianceAuditRansomwarein the CloudThreatIntelligenceFeedVPN(VirtualPrivateNetwork)SharedResponsibilityModelEphemeralInfrastructureNetworkSegmentationDataEncryptionin TransitLogging &MonitoringSecurity GroupMisconfigurationPatchManagementZeroTrustModelDataEncryptionat RestKeyManagementService(KMS)ContainerVulnerabilitiesCloud-nativeSecurityToolsServerlessSecurityConcernsPhishingAttemptDDoSAttackIAM (Identityand AccessManagement)MFA (Multi-FactorAuthentication)API KeyExposureSecuritybyDesignCSPM (CloudSecurityPostureManagement)PublicCloudCloudAccessSecurityBroker(CASB)IntrusionPreventionSystem(IPS)HybridCloud

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. VPC (Virtual Private Cloud)
  2. OAuth Token Hijacking
  3. Endpoint Protection
  4. Cloud Misconfiguration
  5. Data Residency Issues
  6. Least Privilege Principle
  7. Shadow IT
  8. Private Cloud
  9. Intrusion Detection System (IDS)
  10. Incident Response Plan
  11. S3 Bucket Misconfiguration
  12. Backup & Recovery
  13. Compliance Audit
  14. Ransomware in the Cloud
  15. Threat Intelligence Feed
  16. VPN (Virtual Private Network)
  17. Shared Responsibility Model
  18. Ephemeral Infrastructure
  19. Network Segmentation
  20. Data Encryption in Transit
  21. Logging & Monitoring
  22. Security Group Misconfiguration
  23. Patch Management
  24. Zero Trust Model
  25. Data Encryption at Rest
  26. Key Management Service (KMS)
  27. Container Vulnerabilities
  28. Cloud-native Security Tools
  29. Serverless Security Concerns
  30. Phishing Attempt
  31. DDoS Attack
  32. IAM (Identity and Access Management)
  33. MFA (Multi-Factor Authentication)
  34. API Key Exposure
  35. Security by Design
  36. CSPM (Cloud Security Posture Management)
  37. Public Cloud
  38. Cloud Access Security Broker (CASB)
  39. Intrusion Prevention System (IPS)
  40. Hybrid Cloud