Artifact use cases and secure management
Configuring applications and related services to support multiple Availability Zones and Regions while minimizing downtime
Deploying Firewall Manager to enforce policies
Identifying, interpreting, and prioritizing problems in network connectivity (for example, by using Amazon Inspector Network Reachability)
Implementing infrastructure patterns, governance controls, and security standards into reusable IaC templates (for example, AWS Service Catalog, CloudFormation modules, AWS CDK)
Systems Manager Parameter Store
Searching log data by using filter and pattern syntax or CloudWatch Logs Insights
Enforcing proper separation of duties
Performing queries to validate security events (for example, by using Amazon Athena)
Different types of tests (for example, unit tests, integration tests, acceptance tests, user interface tests, security scans)
Managing network configurations as requirements change (for example, by using AWS Firewall Manager)
Implementing robust security auditing
Designing cross-Region networking by using private VIFs and public VIFs
AWS services and features that provide logging capabilities (for example, VPC Flow Logs, DNS logs, AWS CloudTrail, Amazon CloudWatch Logs)
Building event processing workflows (for example, Amazon Simple Queue Service [Amazon SQS], Kinesis, Amazon SNS, Lambda, Step Functions)