Configuring EventBridge to send notifications based on a particular event pattern
Configuring security permissions to allow access to artifact repositories (for example, AWS Identity and Access Management [IAM], CodeArtifact)
Applying CloudFormation StackSets across multiple accounts and AWS Regions
Identity federation techniques (for example, using IAM identity providers and AWS IAM Identity Center [AWS Single Sign-On])
Anomaly detection alarms (for example, CloudWatch anomaly detection)
Multi-AZ and multi-Region deployments (for example, compute layer, data layer)
Analyzing real-time log streams (for example, using Kinesis Data Streams)
Methods and strategies to interact with the AWS software-defined infrastructure
Setting up build processes (for example, AWS CodeBuild)
Determining appropriate deployment strategies (for example, AWS CodeDeploy)
Enabling cross-Region solutions where available (for example, Amazon DynamoDB, Amazon RDS, Amazon Route 53, Amazon S3, Amazon CloudFront)
Analyzing logs, metrics, and security findings
AWS services for identifying security vulnerabilities and events (for example, GuardDuty, Amazon Inspector, IAM Access Analyzer, AWS Config)
Configuring health checks (for example, Route 53, ALB)
AWS services that generate, capture, and process events (for example, AWS Health, EventBridge, CloudTrail)
Health check capabilities in AWS services (for example, ALB target groups, Route 53)