Security-specific AWS solutions
Backup practices and methods
Evaluating a strategy for the secure management of secrets and credentials
Auditing an environment for least privilege access
Reviewing implemented solutions to ensure security at every layer
Reviewing comprehensive traceability of users and services
Prioritizing automated responses to the detection of vulnerabilities
Designing and implementing a patch and update process
Designing and implementing a backup process
Employing remediation techniques
High-performing systems architectures (for example, auto scaling, instance fleets, placement groups)
Global service offerings (for example, AWS Global Accelerator, Amazon CloudFront, edge computing services)
Monitoring tool sets and services (for example, CloudWatch)
Service level agreements (SLAs) and key performance indicators (KPIs)
Translating business requirements to measurable metrics