Container Vulnerabilities API Key Exposure Zero Trust Model Cloud Misconfiguration Key Management Service (KMS) Data Encryption in Transit Ransomware in the Cloud Logging & Monitoring Serverless Security Concerns MFA (Multi- Factor Authentication) OAuth Token Hijacking Shared Responsibility Model Ephemeral Infrastructure Data Encryption at Rest Private Cloud Patch Management Intrusion Detection System (IDS) Public Cloud Threat Intelligence Feed Cloud Access Security Broker (CASB) Compliance Audit DDoS Attack S3 Bucket Misconfiguration Incident Response Plan Network Segmentation IAM (Identity and Access Management) Intrusion Prevention System (IPS) Security by Design Least Privilege Principle Cloud- native Security Tools Phishing Attempt Shadow IT Data Residency Issues Hybrid Cloud VPN (Virtual Private Network) Endpoint Protection CSPM (Cloud Security Posture Management) Backup & Recovery VPC (Virtual Private Cloud) Security Group Misconfiguration Container Vulnerabilities API Key Exposure Zero Trust Model Cloud Misconfiguration Key Management Service (KMS) Data Encryption in Transit Ransomware in the Cloud Logging & Monitoring Serverless Security Concerns MFA (Multi- Factor Authentication) OAuth Token Hijacking Shared Responsibility Model Ephemeral Infrastructure Data Encryption at Rest Private Cloud Patch Management Intrusion Detection System (IDS) Public Cloud Threat Intelligence Feed Cloud Access Security Broker (CASB) Compliance Audit DDoS Attack S3 Bucket Misconfiguration Incident Response Plan Network Segmentation IAM (Identity and Access Management) Intrusion Prevention System (IPS) Security by Design Least Privilege Principle Cloud- native Security Tools Phishing Attempt Shadow IT Data Residency Issues Hybrid Cloud VPN (Virtual Private Network) Endpoint Protection CSPM (Cloud Security Posture Management) Backup & Recovery VPC (Virtual Private Cloud) Security Group Misconfiguration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Container Vulnerabilities
API Key Exposure
Zero Trust Model
Cloud Misconfiguration
Key Management Service (KMS)
Data Encryption in Transit
Ransomware in the Cloud
Logging & Monitoring
Serverless Security Concerns
MFA (Multi-Factor Authentication)
OAuth Token Hijacking
Shared Responsibility Model
Ephemeral Infrastructure
Data Encryption at Rest
Private Cloud
Patch Management
Intrusion Detection System (IDS)
Public Cloud
Threat Intelligence Feed
Cloud Access Security Broker (CASB)
Compliance Audit
DDoS Attack
S3 Bucket Misconfiguration
Incident Response Plan
Network Segmentation
IAM (Identity and Access Management)
Intrusion Prevention System (IPS)
Security by Design
Least Privilege Principle
Cloud-native Security Tools
Phishing Attempt
Shadow IT
Data Residency Issues
Hybrid Cloud
VPN (Virtual Private Network)
Endpoint Protection
CSPM (Cloud Security Posture Management)
Backup & Recovery
VPC (Virtual Private Cloud)
Security Group Misconfiguration