EndpointProtectionSharedResponsibilityModelVPN(VirtualPrivateNetwork)IAM (Identityand AccessManagement)DataResidencyIssuesIntrusionDetectionSystem(IDS)PrivateCloudPublicCloudZeroTrustModelDDoSAttackAPI KeyExposureEphemeralInfrastructureCSPM (CloudSecurityPostureManagement)Security GroupMisconfigurationPatchManagementCloudMisconfigurationPhishingAttemptComplianceAuditKeyManagementService(KMS)IncidentResponsePlanBackup&RecoveryDataEncryptionat RestThreatIntelligenceFeedOAuthTokenHijackingLogging &MonitoringS3 BucketMisconfigurationCloud-nativeSecurityToolsDataEncryptionin TransitSecuritybyDesignNetworkSegmentationShadowITServerlessSecurityConcernsCloudAccessSecurityBroker(CASB)HybridCloudRansomwarein the CloudMFA (Multi-FactorAuthentication)VPC(VirtualPrivateCloud)LeastPrivilegePrincipleIntrusionPreventionSystem(IPS)ContainerVulnerabilitiesEndpointProtectionSharedResponsibilityModelVPN(VirtualPrivateNetwork)IAM (Identityand AccessManagement)DataResidencyIssuesIntrusionDetectionSystem(IDS)PrivateCloudPublicCloudZeroTrustModelDDoSAttackAPI KeyExposureEphemeralInfrastructureCSPM (CloudSecurityPostureManagement)Security GroupMisconfigurationPatchManagementCloudMisconfigurationPhishingAttemptComplianceAuditKeyManagementService(KMS)IncidentResponsePlanBackup&RecoveryDataEncryptionat RestThreatIntelligenceFeedOAuthTokenHijackingLogging &MonitoringS3 BucketMisconfigurationCloud-nativeSecurityToolsDataEncryptionin TransitSecuritybyDesignNetworkSegmentationShadowITServerlessSecurityConcernsCloudAccessSecurityBroker(CASB)HybridCloudRansomwarein the CloudMFA (Multi-FactorAuthentication)VPC(VirtualPrivateCloud)LeastPrivilegePrincipleIntrusionPreventionSystem(IPS)ContainerVulnerabilities

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Endpoint Protection
  2. Shared Responsibility Model
  3. VPN (Virtual Private Network)
  4. IAM (Identity and Access Management)
  5. Data Residency Issues
  6. Intrusion Detection System (IDS)
  7. Private Cloud
  8. Public Cloud
  9. Zero Trust Model
  10. DDoS Attack
  11. API Key Exposure
  12. Ephemeral Infrastructure
  13. CSPM (Cloud Security Posture Management)
  14. Security Group Misconfiguration
  15. Patch Management
  16. Cloud Misconfiguration
  17. Phishing Attempt
  18. Compliance Audit
  19. Key Management Service (KMS)
  20. Incident Response Plan
  21. Backup & Recovery
  22. Data Encryption at Rest
  23. Threat Intelligence Feed
  24. OAuth Token Hijacking
  25. Logging & Monitoring
  26. S3 Bucket Misconfiguration
  27. Cloud-native Security Tools
  28. Data Encryption in Transit
  29. Security by Design
  30. Network Segmentation
  31. Shadow IT
  32. Serverless Security Concerns
  33. Cloud Access Security Broker (CASB)
  34. Hybrid Cloud
  35. Ransomware in the Cloud
  36. MFA (Multi-Factor Authentication)
  37. VPC (Virtual Private Cloud)
  38. Least Privilege Principle
  39. Intrusion Prevention System (IPS)
  40. Container Vulnerabilities