ShadowITServerlessSecurityConcernsNetworkSegmentationMFA (Multi-FactorAuthentication)IncidentResponsePlanEphemeralInfrastructureIntrusionPreventionSystem(IPS)ComplianceAuditSharedResponsibilityModelPhishingAttemptPatchManagementContainerVulnerabilitiesRansomwarein the CloudHybridCloudEndpointProtectionCloudMisconfigurationLogging &MonitoringCSPM (CloudSecurityPostureManagement)SecuritybyDesignDataResidencyIssuesDDoSAttackPrivateCloudIAM (Identityand AccessManagement)IntrusionDetectionSystem(IDS)API KeyExposureThreatIntelligenceFeedOAuthTokenHijackingVPN(VirtualPrivateNetwork)Cloud-nativeSecurityToolsZeroTrustModelS3 BucketMisconfigurationDataEncryptionat RestLeastPrivilegePrinciplePublicCloudBackup&RecoveryVPC(VirtualPrivateCloud)Security GroupMisconfigurationKeyManagementService(KMS)CloudAccessSecurityBroker(CASB)DataEncryptionin TransitShadowITServerlessSecurityConcernsNetworkSegmentationMFA (Multi-FactorAuthentication)IncidentResponsePlanEphemeralInfrastructureIntrusionPreventionSystem(IPS)ComplianceAuditSharedResponsibilityModelPhishingAttemptPatchManagementContainerVulnerabilitiesRansomwarein the CloudHybridCloudEndpointProtectionCloudMisconfigurationLogging &MonitoringCSPM (CloudSecurityPostureManagement)SecuritybyDesignDataResidencyIssuesDDoSAttackPrivateCloudIAM (Identityand AccessManagement)IntrusionDetectionSystem(IDS)API KeyExposureThreatIntelligenceFeedOAuthTokenHijackingVPN(VirtualPrivateNetwork)Cloud-nativeSecurityToolsZeroTrustModelS3 BucketMisconfigurationDataEncryptionat RestLeastPrivilegePrinciplePublicCloudBackup&RecoveryVPC(VirtualPrivateCloud)Security GroupMisconfigurationKeyManagementService(KMS)CloudAccessSecurityBroker(CASB)DataEncryptionin Transit

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Shadow IT
  2. Serverless Security Concerns
  3. Network Segmentation
  4. MFA (Multi-Factor Authentication)
  5. Incident Response Plan
  6. Ephemeral Infrastructure
  7. Intrusion Prevention System (IPS)
  8. Compliance Audit
  9. Shared Responsibility Model
  10. Phishing Attempt
  11. Patch Management
  12. Container Vulnerabilities
  13. Ransomware in the Cloud
  14. Hybrid Cloud
  15. Endpoint Protection
  16. Cloud Misconfiguration
  17. Logging & Monitoring
  18. CSPM (Cloud Security Posture Management)
  19. Security by Design
  20. Data Residency Issues
  21. DDoS Attack
  22. Private Cloud
  23. IAM (Identity and Access Management)
  24. Intrusion Detection System (IDS)
  25. API Key Exposure
  26. Threat Intelligence Feed
  27. OAuth Token Hijacking
  28. VPN (Virtual Private Network)
  29. Cloud-native Security Tools
  30. Zero Trust Model
  31. S3 Bucket Misconfiguration
  32. Data Encryption at Rest
  33. Least Privilege Principle
  34. Public Cloud
  35. Backup & Recovery
  36. VPC (Virtual Private Cloud)
  37. Security Group Misconfiguration
  38. Key Management Service (KMS)
  39. Cloud Access Security Broker (CASB)
  40. Data Encryption in Transit