Deploying container-based applications (for example, Amazon ECS, Amazon EKS)
Creating CloudWatch metric streams (for example, Amazon S3 or Amazon Kinesis Data Firehose options)
Appropriate usage of different IAM entities for human and machine access (for example, users, groups, roles, identity providers, identity-based policies, resource-based policies, session policies)
Managing log storage lifecycles (for example, S3 lifecycles, CloudWatch log group retention)
Pipeline deployment patterns for single- and multi-account environments
Configuring serverless applications (for example, Amazon API Gateway, Lambda, AWS Fargate)
Configuration management services and strategies
AWS services and solutions to automate tasks and processes
Configuring code, image, and artifact repositories
Automating unit tests and code coverage
Encryption options for at-rest and in-transit logs and metrics (for example, client-side and server-side, AWS Key Management Service [AWS KMS])
Securely storing and managing logs
Developing Lambda function automations for complex scenarios (for example, AWS SDKs, Lambda, AWS Step Functions)
Capabilities of auto scaling for a variety of AWS services (for example, EC2 Auto Scaling groups, RDS storage auto scaling, DynamoDB, ECS capacity provider, EKS autoscalers)
Permission management delegation by using IAM permissions boundaries