How to analyze reachability (for example, by using VPC Reachability Analyzer and Amazon Inspector)
Backup and recovery strategies (for example, pilot light, warm standby)
Identifying and implementing appropriate cross-Region backup and recovery strategies (for example, AWS Backup, Amazon S3, Systems Manager)
Access permissions that are necessary for logging
Visibility and control over AWS infrastructure
Configuring service and application logging (for example, CloudTrail, CloudWatch Logs)
Creating AWS Config rules for detection of noncompliant AWS resources
Anomaly and correlation techniques to join data across services
Data management (for example, data classification, encryption, key management, access controls)
Capturing relevant forensics data from a compromised resource (for example, Amazon Elastic Block Store [Amazon EBS] volume snapshots, memory dump)
Requiring TLS for AWS API calls (for example, with Amazon S3)
Data classification by using AWS services
Analyzing the service functionality, permissions, and configuration of resources after an event that did not provide visibility or alerting
Analyzing Amazon Inspector findings and determining appropriate mitigation techniques
Identifying unused resources by using AWS services and tools (for example, AWS Trusted Advisor, AWS Cost Explorer)