Determining the cause of missing logs and performing remediation steps
How to troubleshoot authentication issues (for example, by using CloudTrail, IAM Access Advisor, and IAM policy simulator)
AWS best practices for incident response
Applying IAM solutions for multi-account and complex organization structures (for example, SCPs, assuming roles)
Applying restrictions at the edge based on various criteria (for example, geography, geolocation, rate limit)
Configuring encryption of log data (for example, AWS KMS)
Designing policies to enforce least privilege access
Implementing role-based and attribute-based access control patterns
Determining when and how to deploy AWS Control Tower (for example, which services must be deactivated for successful deployment)
Reasonable use of different types of tests at different stages of the CI/CD pipeline
Measuring application health based on application exit codes
Analyzing environments and workloads to determine monitoring requirements
Configuration of monitoring services (for example, Security Hub)
Deploying workloads in multiple Regions for global scalability