Automated monitoring and remediation strategies (for example, AWS Config rules)
Secrets management (for example, Systems Manager, AWS Secrets Manager)
Principle of least privilege access
Security-specific AWS solutions
Backup practices and methods
Evaluating a strategy for the secure management of secrets and credentials
Auditing an environment for least privilege access
Reviewing implemented solutions to ensure security at every layer
Reviewing comprehensive traceability of users and services
Prioritizing automated responses to the detection of vulnerabilities
Designing and implementing a patch and update process
Designing and implementing a backup process
Employing remediation techniques
High-performing systems architectures (for example, auto scaling, instance fleets, placement groups)
Global service offerings (for example, AWS Global Accelerator, Amazon CloudFront, edge computing services)