How to log application data
Best practices for performance tuning
How to log access to AWS services
Amazon Macie, AWS CloudTrail, and Amazon CloudWatch
How to implement data skew mechanisms
Data validation (data completeness, consistency, accuracy, and integrity)
VPC security networking concepts
Differences between managed services and unmanaged services
Authentication methods (password-based, certificate-based, and role-based)
Differences between AWS managed policies and customer managed policies
Authorization methods (role-based, policy-based, tag-based, and attributebased)
Principle of least privilege as it applies to AWS security
Role-based access control and expected access patterns
Methods to protect data from unauthorized access across services