Security by Design Serverless Security Concerns Shadow IT Zero Trust Model S3 Bucket Misconfiguration Security Group Misconfiguration Cloud- native Security Tools VPC (Virtual Private Cloud) Ransomware in the Cloud IAM (Identity and Access Management) Key Management Service (KMS) Public Cloud MFA (Multi- Factor Authentication) API Key Exposure Endpoint Protection VPN (Virtual Private Network) Phishing Attempt DDoS Attack Backup & Recovery Intrusion Prevention System (IPS) Incident Response Plan Private Cloud Least Privilege Principle Intrusion Detection System (IDS) Data Encryption at Rest CSPM (Cloud Security Posture Management) Shared Responsibility Model Network Segmentation OAuth Token Hijacking Container Vulnerabilities Threat Intelligence Feed Data Residency Issues Patch Management Compliance Audit Data Encryption in Transit Ephemeral Infrastructure Cloud Access Security Broker (CASB) Cloud Misconfiguration Hybrid Cloud Logging & Monitoring Security by Design Serverless Security Concerns Shadow IT Zero Trust Model S3 Bucket Misconfiguration Security Group Misconfiguration Cloud- native Security Tools VPC (Virtual Private Cloud) Ransomware in the Cloud IAM (Identity and Access Management) Key Management Service (KMS) Public Cloud MFA (Multi- Factor Authentication) API Key Exposure Endpoint Protection VPN (Virtual Private Network) Phishing Attempt DDoS Attack Backup & Recovery Intrusion Prevention System (IPS) Incident Response Plan Private Cloud Least Privilege Principle Intrusion Detection System (IDS) Data Encryption at Rest CSPM (Cloud Security Posture Management) Shared Responsibility Model Network Segmentation OAuth Token Hijacking Container Vulnerabilities Threat Intelligence Feed Data Residency Issues Patch Management Compliance Audit Data Encryption in Transit Ephemeral Infrastructure Cloud Access Security Broker (CASB) Cloud Misconfiguration Hybrid Cloud Logging & Monitoring
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Security by Design
Serverless Security Concerns
Shadow IT
Zero Trust Model
S3 Bucket Misconfiguration
Security Group Misconfiguration
Cloud-native Security Tools
VPC (Virtual Private Cloud)
Ransomware in the Cloud
IAM (Identity and Access Management)
Key Management Service (KMS)
Public Cloud
MFA (Multi-Factor Authentication)
API Key Exposure
Endpoint Protection
VPN (Virtual Private Network)
Phishing Attempt
DDoS Attack
Backup & Recovery
Intrusion Prevention System (IPS)
Incident Response Plan
Private Cloud
Least Privilege Principle
Intrusion Detection System (IDS)
Data Encryption at Rest
CSPM (Cloud Security Posture Management)
Shared Responsibility Model
Network Segmentation
OAuth Token Hijacking
Container Vulnerabilities
Threat Intelligence Feed
Data Residency Issues
Patch Management
Compliance Audit
Data Encryption in Transit
Ephemeral Infrastructure
Cloud Access Security Broker (CASB)
Cloud Misconfiguration
Hybrid Cloud
Logging & Monitoring