Managing permissions to control access to human and machine identities (for example, enabling multi-factor authentication [MFA], AWS Security Token Service [AWS STS], IAM profiles)
Translating business requirements into technical resiliency needs
Configuration management services (for example, AWS Config)
Processing log data by using CloudWatch log subscriptions (for example, Kinesis, Lambda, Amazon OpenSearch Service)
Managing build and deployment secrets (for example, AWS Secrets Manager, AWS Systems Manager Parameter Store)
Methods to create and generate artifacts
Artifact lifecycle considerations
Creating CloudWatch custom metrics and metric filters, alarms, and notifications (for example, Amazon SNS, Lambda)
Mutable deployment patterns in contrast to immutable deployment patterns
Identifying and remediating single points of failure in existing workloads
Change management processes for IaC-based platforms
Determining optimal configuration management services (for example, AWS OpsWorks, AWS Systems Manager, AWS Config, AWS AppConfig)
Loosely coupled and distributed architectures
Testing failover of Multi-AZ and multi-Region workloads (for example, Amazon RDS, Amazon Aurora, Route 53, CloudFront)
How to monitor applications and infrastructure