Security GroupMisconfigurationIAM (Identityand AccessManagement)OAuthTokenHijackingAPI KeyExposureRansomwarein the CloudSharedResponsibilityModelDDoSAttackEphemeralInfrastructureThreatIntelligenceFeedS3 BucketMisconfigurationPhishingAttemptDataEncryptionat RestDataEncryptionin TransitComplianceAuditCloud-nativeSecurityToolsDataResidencyIssuesHybridCloudServerlessSecurityConcernsPrivateCloudSecuritybyDesignIntrusionDetectionSystem(IDS)NetworkSegmentationMFA (Multi-FactorAuthentication)VPN(VirtualPrivateNetwork)ZeroTrustModelVPC(VirtualPrivateCloud)ContainerVulnerabilitiesEndpointProtectionLogging &MonitoringLeastPrivilegePrincipleCSPM (CloudSecurityPostureManagement)IntrusionPreventionSystem(IPS)PatchManagementCloudAccessSecurityBroker(CASB)CloudMisconfigurationIncidentResponsePlanBackup&RecoveryShadowITPublicCloudKeyManagementService(KMS)Security GroupMisconfigurationIAM (Identityand AccessManagement)OAuthTokenHijackingAPI KeyExposureRansomwarein the CloudSharedResponsibilityModelDDoSAttackEphemeralInfrastructureThreatIntelligenceFeedS3 BucketMisconfigurationPhishingAttemptDataEncryptionat RestDataEncryptionin TransitComplianceAuditCloud-nativeSecurityToolsDataResidencyIssuesHybridCloudServerlessSecurityConcernsPrivateCloudSecuritybyDesignIntrusionDetectionSystem(IDS)NetworkSegmentationMFA (Multi-FactorAuthentication)VPN(VirtualPrivateNetwork)ZeroTrustModelVPC(VirtualPrivateCloud)ContainerVulnerabilitiesEndpointProtectionLogging &MonitoringLeastPrivilegePrincipleCSPM (CloudSecurityPostureManagement)IntrusionPreventionSystem(IPS)PatchManagementCloudAccessSecurityBroker(CASB)CloudMisconfigurationIncidentResponsePlanBackup&RecoveryShadowITPublicCloudKeyManagementService(KMS)

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Security Group Misconfiguration
  2. IAM (Identity and Access Management)
  3. OAuth Token Hijacking
  4. API Key Exposure
  5. Ransomware in the Cloud
  6. Shared Responsibility Model
  7. DDoS Attack
  8. Ephemeral Infrastructure
  9. Threat Intelligence Feed
  10. S3 Bucket Misconfiguration
  11. Phishing Attempt
  12. Data Encryption at Rest
  13. Data Encryption in Transit
  14. Compliance Audit
  15. Cloud-native Security Tools
  16. Data Residency Issues
  17. Hybrid Cloud
  18. Serverless Security Concerns
  19. Private Cloud
  20. Security by Design
  21. Intrusion Detection System (IDS)
  22. Network Segmentation
  23. MFA (Multi-Factor Authentication)
  24. VPN (Virtual Private Network)
  25. Zero Trust Model
  26. VPC (Virtual Private Cloud)
  27. Container Vulnerabilities
  28. Endpoint Protection
  29. Logging & Monitoring
  30. Least Privilege Principle
  31. CSPM (Cloud Security Posture Management)
  32. Intrusion Prevention System (IPS)
  33. Patch Management
  34. Cloud Access Security Broker (CASB)
  35. Cloud Misconfiguration
  36. Incident Response Plan
  37. Backup & Recovery
  38. Shadow IT
  39. Public Cloud
  40. Key Management Service (KMS)