IAM (Identityand AccessManagement)PublicCloudHybridCloudIntrusionDetectionSystem(IDS)Backup&RecoveryEphemeralInfrastructureSharedResponsibilityModelOAuthTokenHijackingS3 BucketMisconfigurationIntrusionPreventionSystem(IPS)MFA (Multi-FactorAuthentication)ContainerVulnerabilitiesCloudMisconfigurationDDoSAttackPrivateCloudKeyManagementService(KMS)ComplianceAuditLogging &MonitoringRansomwarein the CloudDataEncryptionat RestShadowITVPC(VirtualPrivateCloud)API KeyExposureServerlessSecurityConcernsPatchManagementCloudAccessSecurityBroker(CASB)DataResidencyIssuesNetworkSegmentationDataEncryptionin TransitPhishingAttemptEndpointProtectionVPN(VirtualPrivateNetwork)CSPM (CloudSecurityPostureManagement)SecuritybyDesignLeastPrivilegePrincipleThreatIntelligenceFeedZeroTrustModelIncidentResponsePlanCloud-nativeSecurityToolsSecurity GroupMisconfigurationIAM (Identityand AccessManagement)PublicCloudHybridCloudIntrusionDetectionSystem(IDS)Backup&RecoveryEphemeralInfrastructureSharedResponsibilityModelOAuthTokenHijackingS3 BucketMisconfigurationIntrusionPreventionSystem(IPS)MFA (Multi-FactorAuthentication)ContainerVulnerabilitiesCloudMisconfigurationDDoSAttackPrivateCloudKeyManagementService(KMS)ComplianceAuditLogging &MonitoringRansomwarein the CloudDataEncryptionat RestShadowITVPC(VirtualPrivateCloud)API KeyExposureServerlessSecurityConcernsPatchManagementCloudAccessSecurityBroker(CASB)DataResidencyIssuesNetworkSegmentationDataEncryptionin TransitPhishingAttemptEndpointProtectionVPN(VirtualPrivateNetwork)CSPM (CloudSecurityPostureManagement)SecuritybyDesignLeastPrivilegePrincipleThreatIntelligenceFeedZeroTrustModelIncidentResponsePlanCloud-nativeSecurityToolsSecurity GroupMisconfiguration

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. IAM (Identity and Access Management)
  2. Public Cloud
  3. Hybrid Cloud
  4. Intrusion Detection System (IDS)
  5. Backup & Recovery
  6. Ephemeral Infrastructure
  7. Shared Responsibility Model
  8. OAuth Token Hijacking
  9. S3 Bucket Misconfiguration
  10. Intrusion Prevention System (IPS)
  11. MFA (Multi-Factor Authentication)
  12. Container Vulnerabilities
  13. Cloud Misconfiguration
  14. DDoS Attack
  15. Private Cloud
  16. Key Management Service (KMS)
  17. Compliance Audit
  18. Logging & Monitoring
  19. Ransomware in the Cloud
  20. Data Encryption at Rest
  21. Shadow IT
  22. VPC (Virtual Private Cloud)
  23. API Key Exposure
  24. Serverless Security Concerns
  25. Patch Management
  26. Cloud Access Security Broker (CASB)
  27. Data Residency Issues
  28. Network Segmentation
  29. Data Encryption in Transit
  30. Phishing Attempt
  31. Endpoint Protection
  32. VPN (Virtual Private Network)
  33. CSPM (Cloud Security Posture Management)
  34. Security by Design
  35. Least Privilege Principle
  36. Threat Intelligence Feed
  37. Zero Trust Model
  38. Incident Response Plan
  39. Cloud-native Security Tools
  40. Security Group Misconfiguration