SecuritybyDesignServerlessSecurityConcernsShadowITZeroTrustModelS3 BucketMisconfigurationSecurity GroupMisconfigurationCloud-nativeSecurityToolsVPC(VirtualPrivateCloud)Ransomwarein the CloudIAM (Identityand AccessManagement)KeyManagementService(KMS)PublicCloudMFA (Multi-FactorAuthentication)API KeyExposureEndpointProtectionVPN(VirtualPrivateNetwork)PhishingAttemptDDoSAttackBackup&RecoveryIntrusionPreventionSystem(IPS)IncidentResponsePlanPrivateCloudLeastPrivilegePrincipleIntrusionDetectionSystem(IDS)DataEncryptionat RestCSPM (CloudSecurityPostureManagement)SharedResponsibilityModelNetworkSegmentationOAuthTokenHijackingContainerVulnerabilitiesThreatIntelligenceFeedDataResidencyIssuesPatchManagementComplianceAuditDataEncryptionin TransitEphemeralInfrastructureCloudAccessSecurityBroker(CASB)CloudMisconfigurationHybridCloudLogging &MonitoringSecuritybyDesignServerlessSecurityConcernsShadowITZeroTrustModelS3 BucketMisconfigurationSecurity GroupMisconfigurationCloud-nativeSecurityToolsVPC(VirtualPrivateCloud)Ransomwarein the CloudIAM (Identityand AccessManagement)KeyManagementService(KMS)PublicCloudMFA (Multi-FactorAuthentication)API KeyExposureEndpointProtectionVPN(VirtualPrivateNetwork)PhishingAttemptDDoSAttackBackup&RecoveryIntrusionPreventionSystem(IPS)IncidentResponsePlanPrivateCloudLeastPrivilegePrincipleIntrusionDetectionSystem(IDS)DataEncryptionat RestCSPM (CloudSecurityPostureManagement)SharedResponsibilityModelNetworkSegmentationOAuthTokenHijackingContainerVulnerabilitiesThreatIntelligenceFeedDataResidencyIssuesPatchManagementComplianceAuditDataEncryptionin TransitEphemeralInfrastructureCloudAccessSecurityBroker(CASB)CloudMisconfigurationHybridCloudLogging &Monitoring

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Security by Design
  2. Serverless Security Concerns
  3. Shadow IT
  4. Zero Trust Model
  5. S3 Bucket Misconfiguration
  6. Security Group Misconfiguration
  7. Cloud-native Security Tools
  8. VPC (Virtual Private Cloud)
  9. Ransomware in the Cloud
  10. IAM (Identity and Access Management)
  11. Key Management Service (KMS)
  12. Public Cloud
  13. MFA (Multi-Factor Authentication)
  14. API Key Exposure
  15. Endpoint Protection
  16. VPN (Virtual Private Network)
  17. Phishing Attempt
  18. DDoS Attack
  19. Backup & Recovery
  20. Intrusion Prevention System (IPS)
  21. Incident Response Plan
  22. Private Cloud
  23. Least Privilege Principle
  24. Intrusion Detection System (IDS)
  25. Data Encryption at Rest
  26. CSPM (Cloud Security Posture Management)
  27. Shared Responsibility Model
  28. Network Segmentation
  29. OAuth Token Hijacking
  30. Container Vulnerabilities
  31. Threat Intelligence Feed
  32. Data Residency Issues
  33. Patch Management
  34. Compliance Audit
  35. Data Encryption in Transit
  36. Ephemeral Infrastructure
  37. Cloud Access Security Broker (CASB)
  38. Cloud Misconfiguration
  39. Hybrid Cloud
  40. Logging & Monitoring