Identifying where AWS security information is available (for example, AWS Knowledge Center, AWS Security Center, AWS Security Blog)
Understanding the use of AWS services for identifying security issues (for example, AWS Trusted Advisor)
Deciding between options such as programmatic access (for example, APIs, SDKs, CLI), the AWS Management Console, and infrastructure as code (IaC)
Evaluating requirements to determine whether to use one-time operations or repeatable processes
Identifying different deployment models (for example, cloud, hybrid, onpremises)
Identifying connectivity options (for example, AWS VPN, AWS Direct Connect, public internet)
Describing relationships among Regions, Availability Zones, and edge locations
Describing how to achieve high availability by using multiple Availability Zones
Recognizing that Availability Zones do not share single points of failure
Describing when to use multiple Regions (for example, disaster recovery, business continuity, low latency for end users, data sovereignty)
Describing at a high level the benefits of edge locations (for example, Amazon CloudFront, AWS Global Accelerator)
Recognizing the appropriate use of different EC2 instance types (for example, compute optimized, storage optimized)
Recognizing the appropriate use of different container options (for example, Amazon ECS, Amazon EKS)
Recognizing the appropriate use of different serverless compute options (for example, AWS Fargate, Lambda)
Recognizing that auto scaling provides elasticity
Identifying the purposes of load balancers