ShadowITThreatIntelligenceFeedIntrusionDetectionSystem(IDS)Security GroupMisconfigurationLogging &MonitoringSharedResponsibilityModelBackup&RecoveryVPN(VirtualPrivateNetwork)LeastPrivilegePrinciplePhishingAttemptAPI KeyExposurePublicCloudDataEncryptionin TransitDataResidencyIssuesDataEncryptionat RestVPC(VirtualPrivateCloud)ZeroTrustModelCloudMisconfigurationOAuthTokenHijackingIncidentResponsePlanS3 BucketMisconfigurationContainerVulnerabilitiesCloud-nativeSecurityToolsSecuritybyDesignEndpointProtectionComplianceAuditPrivateCloudDDoSAttackServerlessSecurityConcernsRansomwarein the CloudNetworkSegmentationMFA (Multi-FactorAuthentication)IAM (Identityand AccessManagement)CSPM (CloudSecurityPostureManagement)KeyManagementService(KMS)EphemeralInfrastructureCloudAccessSecurityBroker(CASB)PatchManagementIntrusionPreventionSystem(IPS)HybridCloudShadowITThreatIntelligenceFeedIntrusionDetectionSystem(IDS)Security GroupMisconfigurationLogging &MonitoringSharedResponsibilityModelBackup&RecoveryVPN(VirtualPrivateNetwork)LeastPrivilegePrinciplePhishingAttemptAPI KeyExposurePublicCloudDataEncryptionin TransitDataResidencyIssuesDataEncryptionat RestVPC(VirtualPrivateCloud)ZeroTrustModelCloudMisconfigurationOAuthTokenHijackingIncidentResponsePlanS3 BucketMisconfigurationContainerVulnerabilitiesCloud-nativeSecurityToolsSecuritybyDesignEndpointProtectionComplianceAuditPrivateCloudDDoSAttackServerlessSecurityConcernsRansomwarein the CloudNetworkSegmentationMFA (Multi-FactorAuthentication)IAM (Identityand AccessManagement)CSPM (CloudSecurityPostureManagement)KeyManagementService(KMS)EphemeralInfrastructureCloudAccessSecurityBroker(CASB)PatchManagementIntrusionPreventionSystem(IPS)HybridCloud

Cloud Security BINGO - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
  1. Shadow IT
  2. Threat Intelligence Feed
  3. Intrusion Detection System (IDS)
  4. Security Group Misconfiguration
  5. Logging & Monitoring
  6. Shared Responsibility Model
  7. Backup & Recovery
  8. VPN (Virtual Private Network)
  9. Least Privilege Principle
  10. Phishing Attempt
  11. API Key Exposure
  12. Public Cloud
  13. Data Encryption in Transit
  14. Data Residency Issues
  15. Data Encryption at Rest
  16. VPC (Virtual Private Cloud)
  17. Zero Trust Model
  18. Cloud Misconfiguration
  19. OAuth Token Hijacking
  20. Incident Response Plan
  21. S3 Bucket Misconfiguration
  22. Container Vulnerabilities
  23. Cloud-native Security Tools
  24. Security by Design
  25. Endpoint Protection
  26. Compliance Audit
  27. Private Cloud
  28. DDoS Attack
  29. Serverless Security Concerns
  30. Ransomware in the Cloud
  31. Network Segmentation
  32. MFA (Multi-Factor Authentication)
  33. IAM (Identity and Access Management)
  34. CSPM (Cloud Security Posture Management)
  35. Key Management Service (KMS)
  36. Ephemeral Infrastructure
  37. Cloud Access Security Broker (CASB)
  38. Patch Management
  39. Intrusion Prevention System (IPS)
  40. Hybrid Cloud