Appropriate metrics for scaling services
Host-based security (for example, firewalls, hardening)
Creating and configuring artifact repositories (for example, AWS CodeArtifact, Amazon S3, Amazon Elastic Container Registry [Amazon ECR])
Tools that monitor metrics and baselines (for example, GuardDuty, Systems Manager)
Identifying anomalies based on resource utilization and trends
Configuring a load balancer to recover from backend failure
Composing and deploying IaC templates (for example, AWS Serverless Application Model [AWS SAM], AWS CloudFormation, AWS Cloud Development Kit [AWS CDK])
Determining when to use AWS Security Token Service (AWS STS) to issue temporary credentials
Analyzing incidents regarding failed processes (for example, auto scaling, Amazon ECS, Amazon EKS)
Maintaining software compliance (for example, Systems Manager)
Securing AWS account root user credentials
Designing network flows to keep data off the public internet (for example, by using Transit Gateway, VPC endpoints, and Lambda in VPCs)
Techniques for root cause analysis
Techniques to achieve high availability (for example, Multi-AZ, multi-Region)