Shadow IT Threat Intelligence Feed Intrusion Detection System (IDS) Security Group Misconfiguration Logging & Monitoring Shared Responsibility Model Backup & Recovery VPN (Virtual Private Network) Least Privilege Principle Phishing Attempt API Key Exposure Public Cloud Data Encryption in Transit Data Residency Issues Data Encryption at Rest VPC (Virtual Private Cloud) Zero Trust Model Cloud Misconfiguration OAuth Token Hijacking Incident Response Plan S3 Bucket Misconfiguration Container Vulnerabilities Cloud- native Security Tools Security by Design Endpoint Protection Compliance Audit Private Cloud DDoS Attack Serverless Security Concerns Ransomware in the Cloud Network Segmentation MFA (Multi- Factor Authentication) IAM (Identity and Access Management) CSPM (Cloud Security Posture Management) Key Management Service (KMS) Ephemeral Infrastructure Cloud Access Security Broker (CASB) Patch Management Intrusion Prevention System (IPS) Hybrid Cloud Shadow IT Threat Intelligence Feed Intrusion Detection System (IDS) Security Group Misconfiguration Logging & Monitoring Shared Responsibility Model Backup & Recovery VPN (Virtual Private Network) Least Privilege Principle Phishing Attempt API Key Exposure Public Cloud Data Encryption in Transit Data Residency Issues Data Encryption at Rest VPC (Virtual Private Cloud) Zero Trust Model Cloud Misconfiguration OAuth Token Hijacking Incident Response Plan S3 Bucket Misconfiguration Container Vulnerabilities Cloud- native Security Tools Security by Design Endpoint Protection Compliance Audit Private Cloud DDoS Attack Serverless Security Concerns Ransomware in the Cloud Network Segmentation MFA (Multi- Factor Authentication) IAM (Identity and Access Management) CSPM (Cloud Security Posture Management) Key Management Service (KMS) Ephemeral Infrastructure Cloud Access Security Broker (CASB) Patch Management Intrusion Prevention System (IPS) Hybrid Cloud
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Shadow IT
Threat Intelligence Feed
Intrusion Detection System (IDS)
Security Group Misconfiguration
Logging & Monitoring
Shared Responsibility Model
Backup & Recovery
VPN (Virtual Private Network)
Least Privilege Principle
Phishing Attempt
API Key Exposure
Public Cloud
Data Encryption in Transit
Data Residency Issues
Data Encryption at Rest
VPC (Virtual Private Cloud)
Zero Trust Model
Cloud Misconfiguration
OAuth Token Hijacking
Incident Response Plan
S3 Bucket Misconfiguration
Container Vulnerabilities
Cloud-native Security Tools
Security by Design
Endpoint Protection
Compliance Audit
Private Cloud
DDoS Attack
Serverless Security Concerns
Ransomware in the Cloud
Network Segmentation
MFA (Multi-Factor Authentication)
IAM (Identity and Access Management)
CSPM (Cloud Security Posture Management)
Key Management Service (KMS)
Ephemeral Infrastructure
Cloud Access Security Broker (CASB)
Patch Management
Intrusion Prevention System (IPS)
Hybrid Cloud