Database consistency models (for example, strongly consistent, eventually consistent)
Differences between query and scan operations
Amazon DynamoDB keys and indexing
Caching strategies (for example, write-through, read-through, lazy loading, TTL)
Amazon S3 tiers and lifecycle management
Differences between ephemeral and persistent data storage patterns
Identity federation (for example, Security Assertion Markup Language [SAML], OpenID Connect [OIDC], Amazon Cognito)
Bearer tokens (for example, JSON Web Token [JWT], OAuth, AWS Security Token Service [AWS STS])
The comparison of user pools and identity pools in Amazon Cognito
Resource-based policies, service policies, and principal policies
Role-based access control (RBAC)
Application authorization that uses ACLs
The principle of least privilege
Differences between AWS managed policies and customer-managed policies
Identity and access management
Encryption at rest and in transit