{"id":14842,"date":"2021-03-07T04:00:00","date_gmt":"2021-03-06T22:30:00","guid":{"rendered":"https:\/\/www.testpreptraining.com\/blog\/?p=14842"},"modified":"2024-06-06T14:25:27","modified_gmt":"2024-06-06T08:55:27","slug":"is-aws-certified-security-specialty-certification-worth-it","status":"publish","type":"post","link":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/","title":{"rendered":"Is AWS Certified Security Specialty certification worth it?"},"content":{"rendered":"\n<p>AWS Certified Security Specialty certification can be a valuable credential for security professionals with experience in AWS who are looking to demonstrate their expertise and advance their careers in this field. Companies worldwide are swiftly shifting their operations to the cloud, making cloud computing a crucial capability. Getting certified with <a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-questions\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Certified Security Specialty<\/a> is the perfect way to showcase your knowledge and skills in this area.<\/p>\n\n\n\n<p>This credential distinguishes you as a professional who is serious about applied learning in today&#8217;s highly competitive economy, making you an asset to a future employer. So, before we get started, let&#8217;s have a look at the test specifics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>AWS Certified Security Specialty: Exam Overview<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-questions\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Certified Security-Specialty certification<\/a>&nbsp;assists cloud security professionals in honing their skills in building and executing security solutions to protect the AWS platform. The exam is designed for security professionals with at least two years of experience in IT security, including at least one year of experience working with AWS. Candidates should have a deep understanding of AWS services and best practices related to data protection, incident response, identity and access management, and network security.<\/p>\n\n\n\n<p>The AWS Certified Security Specialty certification is recognized by employers and industry professionals as a mark of expertise in AWS security. In a competitive job market, this certification can set individuals apart and showcase their dedication to constant learning and professional growth.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Target Audience:<\/strong><\/h4>\n\n\n\n<p>The AWS Certified Security Specialty (SCS-C01) exam is for those who work in the security field. The AWS test verifies a candidate&#8217;s ability to successfully show an understanding of the AWS platform&#8217;s security. Candidates must have at least five years of IT security expertise, including creating and implementing security solutions, as well as at least two years of hands-on experience safeguarding AWS workloads using security controls for AWS workloads.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Exam Format<\/strong><\/h4>\n\n\n\n<p>Although the AWS Certified Security Specialist certification test is challenging, becoming familiar with the methodology can help you create a study schedule. Your questions about the exam are fully answered by the exam structure. <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>There are 65 questions in the AWS Certified Security-Specialty certification that are either multiple-choice or multiple-response in nature. <\/li>\n\n\n\n<li>You only have 170 minutes to finish the test. <\/li>\n\n\n\n<li>The exam will cost $300 USD, although prices may vary depending on where you are. <\/li>\n\n\n\n<li>The certification is offered in English, Japanese, Korean, and Simplified Chinese and is valid for three years. <\/li>\n\n\n\n<li>Also, you can select your desired delivery mode from a proctored online exam or a testing center.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Is the AWS Certified Security Specialty<\/strong> <strong>worth it? <\/strong><\/h3>\n\n\n\n<p>AWS certificates are also globally recognized, industry-leading cloud credentials that demonstrate your dedication to your field. The fact that AWS has the greatest proportion of the public cloud infrastructure industry is widely recognized. An AWS certification, on the other hand, establishes your cloud credibility and competency as a person.<\/p>\n\n\n\n<p>Having the AWS Certified Security Specialty credential not only enhances your resume but can also lead to increased earnings. Beyond financial benefits, this certification helps you gain new skills, and in-depth platform knowledge, and discover best practices, making you more productive and valuable to your team. Whether or not the AWS Certified Security Specialty certification is worth it depends on your career goals, experience, and interests. Here are some factors to consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Industry demand: AWS is a leading cloud provider, and its security services are in high demand. Having the AWS Certified Security Specialty certification can demonstrate your expertise in AWS security and make you a more competitive candidate for jobs in this field.<\/li>\n\n\n\n<li>Personal goals: If you&#8217;re interested in developing your skills and knowledge in AWS security, the certification can provide a structured way to learn about the various security services and best practices offered by AWS.<\/li>\n\n\n\n<li>Experience: The AWS Certified Security Specialty certification is designed for security professionals with at least two years of experience in IT security, including at least one year of experience working with AWS. If you already have significant experience with AWS security, you may not need the certification to demonstrate your expertise.<\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>Why take AWS Certified Security Specialty Exam?<\/strong><\/h6>\n\n\n\n<p>There are several reasons why someone might want to take the AWS Certified Security Specialty certification:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validate expertise: The certification is a way to validate an individual&#8217;s expertise in securing applications and workloads on the AWS platform. It demonstrates to employers and peers that the individual has a deep understanding of AWS security services and best practices.<\/li>\n\n\n\n<li>Career advancement: In a tough job market, this certification can make individuals stand out and take their careers to the next level. Employers frequently seek certified individuals for specialized roles, and having this certification can open doors to new opportunities and better salaries.<\/li>\n\n\n\n<li>Professional development: Preparing for the certification exam requires individuals to stay up-to-date with the latest AWS security services and best practices. This can help individuals improve their skills and knowledge, and stay current with industry trends.<\/li>\n\n\n\n<li>Competitive advantage: As more organizations move their applications and workloads to the cloud, the demand for cloud security professionals is increasing. The certification can give individuals a competitive advantage in the job market, particularly for roles that require expertise in securing AWS workloads.<\/li>\n\n\n\n<li>Personal satisfaction: Earning a certification can be a source of personal satisfaction and achievement. By showcasing a dedication to ongoing learning and professional growth, this certification can boost individuals&#8217; confidence in their skills and abilities.<\/li>\n<\/ul>\n\n\n\n<p><em>Now that we understand the importance of AWS certification let&#8217;s get started with our preparations. But before venturing into your preparation journey you must gather all the information about the exam from the <a href=\"https:\/\/aws.amazon.com\/certification\/certified-security-specialty\/\" target=\"_blank\" rel=\"noreferrer noopener\">official site<\/a> and understand the course outline.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Course Outline<\/strong><\/h3>\n\n\n\n<p>The <a href=\"https:\/\/d1.awsstatic.com\/training-and-certification\/docs-security-spec\/AWS-Certified-Security-Specialty_Exam-Guide.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Official Exam Guide<\/a> covers the complete details about the exam domains with various subtopics. This aims to assist candidates in getting ready for the exam by pointing out particular content within each topic that could be on the test. Additionally, the domains covered in the AWS Certified Security Specialty course are:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 1: Threat Detection and Incident Response (14%)<\/strong><\/h4>\n\n\n\n<p>Task Statement 1.1: Design and implement an incident response plan.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS best practices for incident response&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-security-incident-response-guide\/aws-security-incident-response-guide.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Security Incident Response Guide<\/a>)<\/li>\n\n\n\n<li>Cloud incidents<\/li>\n\n\n\n<li>Roles and responsibilities in the incident response plan&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-security-incident-response-guide\/define-roles-and-responsibilities.html\" target=\"_blank\" rel=\"noreferrer noopener\">Define roles and responsibilities<\/a>)<\/li>\n\n\n\n<li>AWS Security Finding Format (ASFF)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/securityhub\/latest\/userguide\/securityhub-findings-format.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Security Finding Format (ASFF)<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing credential invalidation and rotation strategies in response to compromises (for example, by using AWS Identity and Access Management [IAM] and AWS Secrets Manager)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/patterns\/automatically-rotate-iam-user-access-keys-at-scale-with-aws-organizations-and-aws-secrets-manager.html\" target=\"_blank\" rel=\"noreferrer noopener\">Automatically rotate IAM user access keys at scale with AWS Organizations and AWS Secrets Manager<\/a>)<\/li>\n\n\n\n<li>Isolating AWS resources&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/establishing-your-cloud-foundation-on-aws\/design-isolated-resource-environments.html\" target=\"_blank\" rel=\"noreferrer noopener\">Design isolated resource environments<\/a>)<\/li>\n\n\n\n<li>Designing and implementing playbooks and runbooks for responses to security incidents&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/framework\/sec_incident_response_playbooks.html\" target=\"_blank\" rel=\"noreferrer noopener\">Develop and test security incident response playbooks<\/a>)<\/li>\n\n\n\n<li>Deploying security services (for example, AWS Security Hub, Amazon Macie, Amazon GuardDuty, Amazon Inspector, AWS Config, Amazon Detective, AWS Identity and Access Management Access Analyzer)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-overview\/security-services.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security, identity, and compliance<\/a>)<\/li>\n\n\n\n<li>Configuring integrations with native AWS services and third-party services (for example, by using Amazon EventBridge and the ASFF)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 1.2: Detect security threats and anomalies by using AWS services.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS managed security services that detect threats&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/monitoring-data-security.html#:~:text=To%20monitor%20the%20security%20of,these%20managed%20AWS%20security%20services.&amp;text=Amazon%20GuardDuty%20is%20a%20threat,findings%20for%20visibility%20and%20remediation.\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoring data security with managed AWS security services<\/a>)<\/li>\n\n\n\n<li>Anomaly and correlation techniques to join data across services&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/en_us\/quicksight\/latest\/user\/anomaly-detection-outliers-and-key-drivers.html\" target=\"_blank\" rel=\"noreferrer noopener\">Concepts for anomaly or outlier detection<\/a>)<\/li>\n\n\n\n<li>Visualizations to identify anomalies<\/li>\n\n\n\n<li>Strategies to centralize security findings&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/navigating-gdpr-compliance\/centralized-security-management.html#:~:text=Security%20Hub%20centralizes%20and%20prioritizes,the%20highest%20priority%20security%20issues.\" target=\"_blank\" rel=\"noreferrer noopener\">Centralized Security Management<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Evaluating findings from security services (for example, GuardDuty, Security Hub, Macie, AWS Config, IAM Access Analyzer)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/securityhub\/latest\/userguide\/securityhub-internal-providers.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS service integrations with AWS Security Hub<\/a>)<\/li>\n\n\n\n<li>Searching and correlating security threats across AWS services (for example, by using Detective)<\/li>\n\n\n\n<li>Performing queries to validate security events (for example, by using Amazon Athena)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/athena\/latest\/ug\/cloudtrail-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Querying AWS CloudTrail logs<\/a>)<\/li>\n\n\n\n<li>Creating metric filters and dashboards to detect anomalous activity (for example, by using Amazon CloudWatch)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/monitoring\/CloudWatch_Anomaly_Detection.html\" target=\"_blank\" rel=\"noreferrer noopener\">Using CloudWatch anomaly detection<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 1.3: Respond to compromised resources and workloads.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS Security Incident Response Guide&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-security-incident-response-guide\/aws-security-incident-response-guide.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Security Incident Response Guide<\/a>)<\/li>\n\n\n\n<li>Resource isolation mechanisms&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/establishing-your-cloud-foundation-on-aws\/design-isolated-resource-environments.html\" target=\"_blank\" rel=\"noreferrer noopener\">Design isolated resource environments<\/a>)<\/li>\n\n\n\n<li>Techniques for root cause analysis&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/aws.amazon.com\/what-is\/root-cause-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is Root Cause Analysis (RCA)?<\/a>)<\/li>\n\n\n\n<li>Data capture mechanisms&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/sagemaker\/latest\/dg\/model-monitor-data-capture.html\" target=\"_blank\" rel=\"noreferrer noopener\">Capture data<\/a>)<\/li>\n\n\n\n<li>Log analysis for event validation&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/logs\/AnalyzingLogData.html\" target=\"_blank\" rel=\"noreferrer noopener\">Analyzing log data with CloudWatch Logs Insights<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automating remediation by using AWS services (for example, AWS Lambda, AWS Step Functions, EventBridge, AWS Systems Manager runbooks, Security Hub, AWS Config)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/systems-manager\/latest\/userguide\/systems-manager-automation.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Systems Manager&nbsp;Automation<\/a>)<\/li>\n\n\n\n<li>Responding to compromised resources (for example, by isolating Amazon EC2 instances)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/guardduty\/latest\/ug\/compromised-ec2.html\" target=\"_blank\" rel=\"noreferrer noopener\">Remediating a potentially compromised Amazon EC2 instance<\/a>)<\/li>\n\n\n\n<li>Investigating and analyzing to conduct root cause analysis (for example, by using Detective)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/detective\/latest\/userguide\/what-is-detective.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is Amazon Detective?<\/a>)<\/li>\n\n\n\n<li>Capturing relevant forensics data from a compromised resource (for example, Amazon Elastic Block Store [Amazon EBS] volume snapshots, memory dump)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/ebs\/latest\/userguide\/ebs-snapshots.html\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon EBS snapshots<\/a>)<\/li>\n\n\n\n<li>Querying logs in Amazon S3 for contextual information related to security events (for example, by using Athena)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/athena\/latest\/ug\/cloudtrail-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Querying AWS CloudTrail logs<\/a>)<\/li>\n\n\n\n<li>Protecting and preserving forensic artifacts (for example, by using S3 Object Lock, isolated forensic accounts, S3 Lifecycle, and S3 replication)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/object-lock.html\" target=\"_blank\" rel=\"noreferrer noopener\">Using S3 Object Lock<\/a>)<\/li>\n\n\n\n<li>Preparing services for incidents and recovering services after incidents&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-security-incident-response-guide\/recovery.html\" target=\"_blank\" rel=\"noreferrer noopener\">Recovery<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 2: Security Logging and Monitoring (18%)<\/strong><\/h4>\n\n\n\n<p>Task Statement 2.1: Design and implement monitoring and alerting to address security events.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS services that monitor events and provide alarms (for example, CloudWatch, EventBridge)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/monitoring\/cloudwatch-and-eventbridge.html\" target=\"_blank\" rel=\"noreferrer noopener\">Alarm events and EventBridge<\/a>)<\/li>\n\n\n\n<li>AWS services that automate alerting (for example, Lambda, Amazon Simple Notification Service [Amazon SNS], Security Hub)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/securityhub\/latest\/userguide\/securityhub-cloudwatch-events.html\" target=\"_blank\" rel=\"noreferrer noopener\">Automated response and remediation<\/a>)<\/li>\n\n\n\n<li>Tools that monitor metrics and baselines (for example, GuardDuty, Systems Manager)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyzing architectures to identify monitoring requirements and sources of data for security monitoring&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/implementing-logging-monitoring-cloudwatch\/welcome.html\" target=\"_blank\" rel=\"noreferrer noopener\">Designing and implementing logging and monitoring with Amazon CloudWatch<\/a>)<\/li>\n\n\n\n<li>Analyzing environments and workloads to determine monitoring requirements&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/framework\/cost_manage_demand_resources_cost_analysis.html\" target=\"_blank\" rel=\"noreferrer noopener\">Perform an analysis on the workload demand<\/a>)<\/li>\n\n\n\n<li>Designing environment monitoring and workload monitoring based on business and security requirements<\/li>\n\n\n\n<li>Setting up automated tools and scripts to perform regular audits (for example, by creating custom insights in Security Hub)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/securityhub\/latest\/userguide\/securityhub-custom-insights.html\" target=\"_blank\" rel=\"noreferrer noopener\">Custom insights<\/a>)<\/li>\n\n\n\n<li>Defining the metrics and thresholds that generate alerts&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/monitoring\/AlarmThatSendsEmail.html\" target=\"_blank\" rel=\"noreferrer noopener\">Using Amazon CloudWatch alarms<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 2.2: Troubleshoot security monitoring and alerting.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configuration of monitoring services (for example, Security Hub)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/securityhub\/latest\/userguide\/what-is-securityhub.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is AWS Security Hub?<\/a>)<\/li>\n\n\n\n<li>Relevant data that indicates security events&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-security-incident-response-guide\/logging-and-events.html\" target=\"_blank\" rel=\"noreferrer noopener\">Logging and events<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyzing the service functionality, permissions, and configuration of resources after an event that did not provide visibility or alerting&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/access_policies_access-advisor.html\" target=\"_blank\" rel=\"noreferrer noopener\">Refining permissions in AWS using last accessed information<\/a>)<\/li>\n\n\n\n<li>Analyzing and remediating the configuration of a custom application that is not reporting its statistics&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/config\/latest\/developerguide\/WhatIsConfig.html\" target=\"_blank\" rel=\"noreferrer noopener\">What Is AWS Config?<\/a>)<\/li>\n\n\n\n<li>Evaluating logging and monitoring services for alignment with security requirements&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/introduction-aws-security\/monitoring-and-logging.html\" target=\"_blank\" rel=\"noreferrer noopener\">Monitoring and Logging<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 2.3: Design and implement a logging solution.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS services and features that provide logging capabilities (for example, VPC Flow Logs, DNS logs, AWS CloudTrail, Amazon CloudWatch Logs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/flow-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Logging IP traffic using VPC Flow Logs<\/a>)<\/li>\n\n\n\n<li>Attributes of logging capabilities (for example, log levels, type, verbosity)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/python-logging.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Lambda function logging in Python<\/a>)<\/li>\n\n\n\n<li>Log destinations and lifecycle management (for example, retention period)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/object-lifecycle-mgmt.html\" target=\"_blank\" rel=\"noreferrer noopener\">Managing your storage lifecycle<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configuring logging for services and applications&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/security-pillar\/sec_detect_investigate_events_app_service_logging.html\" target=\"_blank\" rel=\"noreferrer noopener\">Configure service and application logging<\/a>)<\/li>\n\n\n\n<li>Identifying logging requirements and sources for log ingestion<\/li>\n\n\n\n<li>Implementing log storage and lifecycle management according to AWS best practices and organizational requirements&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/object-lifecycle-mgmt.html\" target=\"_blank\" rel=\"noreferrer noopener\">Managing your storage lifecycle<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 2.4: Troubleshoot logging solutions.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Capabilities and use cases of AWS services that provide data sources (for example, log level, type, verbosity, cadence, timeliness, immutability)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/logging-monitoring-for-application-owners\/aws-services-logging-monitoring.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS services for logging and monitoring<\/a>)<\/li>\n\n\n\n<li>AWS services and features that provide logging capabilities (for example, VPC Flow Logs, DNS logs, CloudTrail, CloudWatch Logs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/flow-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Logging IP traffic using VPC Flow Logs<\/a>)<\/li>\n\n\n\n<li>Access permissions that are necessary for logging&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/logs\/permissions-reference-cwl.html\" target=\"_blank\" rel=\"noreferrer noopener\">CloudWatch Logs permissions reference<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying misconfiguration and determining remediation steps for absent access permissions that are necessary for logging (for example, by managing read\/write permissions, S3 bucket permissions, public access, and integrity)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/enable-server-access-logging.html\" target=\"_blank\" rel=\"noreferrer noopener\">Enabling Amazon S3 server access logging<\/a>)<\/li>\n\n\n\n<li>Determining the cause of missing logs and performing remediation steps&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/guardduty\/latest\/ug\/guardduty_remediate.html\" target=\"_blank\" rel=\"noreferrer noopener\">Remediating security issues discovered by GuardDuty<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 2.5: Design a log analysis solution.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Services and tools to analyze captured logs (for example, Athena, CloudWatch Logs filter)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/athena\/latest\/ug\/security-logging-monitoring.html\" target=\"_blank\" rel=\"noreferrer noopener\">Logging and monitoring in Athena<\/a>)<\/li>\n\n\n\n<li>Log analysis features of AWS services (for example, CloudWatch Logs Insights, CloudTrail Insights, Security Hub insights)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/logs\/AnalyzingLogData.html\" target=\"_blank\" rel=\"noreferrer noopener\">Analyzing log data with CloudWatch Logs Insights<\/a>)<\/li>\n\n\n\n<li>Log format and components (for example, CloudTrail logs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/cloudtrail-log-file-examples.html\" target=\"_blank\" rel=\"noreferrer noopener\">CloudTrail log file examples<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying patterns in logs to indicate anomalies and known threats&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/logs\/LogsAnomalyDetection.html\" target=\"_blank\" rel=\"noreferrer noopener\">Log anomaly detection<\/a>)<\/li>\n\n\n\n<li>Normalizing, parsing, and correlating logs&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/lambda\/latest\/operatorguide\/parse-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Parsing logs and structured logging<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 3: Infrastructure Security (20%)<\/strong><\/h4>\n\n\n\n<p>Task Statement 3.1: Design and implement security controls for edge services.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security features on edge services (for example, AWS WAF, load balancers, Amazon Route 53, Amazon CloudFront, AWS Shield)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/waf\/latest\/developerguide\/cloudfront-features.html\" target=\"_blank\" rel=\"noreferrer noopener\">How AWS WAF works with Amazon CloudFront features<\/a>)<\/li>\n\n\n\n<li>Common attacks, threats, and exploits (for example, Open Web Application Security Project [OWASP] Top 10, DDoS)<\/li>\n\n\n\n<li>Layered web application architecture&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/serverless-multi-tier-architectures-api-gateway-lambda\/three-tier-architecture-overview.html\" target=\"_blank\" rel=\"noreferrer noopener\">Three-tier architecture overview<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Defining edge security strategies for common use cases (for example, public website, serverless app, mobile app backend)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/serverless-applications-lens\/identity-and-access-management.html\" target=\"_blank\" rel=\"noreferrer noopener\">Identity and access management<\/a>)<\/li>\n\n\n\n<li>Selecting appropriate edge services based on anticipated threats and attacks (for example, OWASP Top 10, DDoS)<\/li>\n\n\n\n<li>Selecting appropriate protections based on anticipated vulnerabilities and risks (for example, vulnerable software, applications, libraries)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/aws.amazon.com\/security\/vulnerability-reporting\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability Reporting<\/a>)<\/li>\n\n\n\n<li>Defining layers of defense by combining edge security services (for example, CloudFront with AWS WAF and load balancers)<\/li>\n\n\n\n<li>Applying restrictions at the edge based on various criteria (for example, geography, geolocation, rate limit)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudFront\/latest\/DeveloperGuide\/georestrictions.html\" target=\"_blank\" rel=\"noreferrer noopener\">Restricting the geographic distribution of your content<\/a>)<\/li>\n\n\n\n<li>Activating logs, metrics, and monitoring around edge services to indicate attacks&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-best-practices-ddos-resiliency\/metrics-and-alarms.html\" target=\"_blank\" rel=\"noreferrer noopener\">Metrics and alarms<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 3.2: Design and implement network security controls.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>VPC security mechanisms (for example, security groups, network ACLs, AWS Network Firewall)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/vpc-security-best-practices.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security best practices for your VPC<\/a>)<\/li>\n\n\n\n<li>Inter-VPC connectivity (for example, AWS Transit Gateway, VPC endpoints)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-vpc-connectivity-options\/amazon-vpc-to-amazon-vpc-connectivity-options.html\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon VPC-to-Amazon VPC connectivity options<\/a>)<\/li>\n\n\n\n<li>Security telemetry sources (for example, Traffic Mirroring, VPC Flow Logs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/flow-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Logging IP traffic using VPC Flow Logs<\/a>)<\/li>\n\n\n\n<li>VPN technology, terminology, and usage&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpn\/latest\/s2svpn\/VPC_VPN.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is AWS Site-to-Site VPN?<\/a>)<\/li>\n\n\n\n<li>On-premises connectivity options (for example, AWS VPN, AWS Direct Connect)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-vpc-connectivity-options\/aws-direct-connect.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Direct Connect<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing network segmentation based on security requirements (for example, public subnets, private subnets, sensitive VPCs, on-premises connectivity)<\/li>\n\n\n\n<li>Designing network controls to permit or prevent network traffic as required (for example, by using security groups, network ACLs, and Network Firewall)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/vpc-network-acls.html\" target=\"_blank\" rel=\"noreferrer noopener\">Control traffic to subnets using network ACLs<\/a>)<\/li>\n\n\n\n<li>Designing network flows to keep data off the public internet (for example, by using Transit Gateway, VPC endpoints, and Lambda in VPCs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/tgw\/what-is-transit-gateway.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is a transit gateway?<\/a>)<\/li>\n\n\n\n<li>Determining which telemetry sources to monitor based on network design, threats, and attacks (for example, load balancer logs, VPC Flow Logs, Traffic Mirroring)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/elasticloadbalancing\/latest\/network\/load-balancer-monitoring.html\" target=\"_blank\" rel=\"noreferrer noopener\">Monitor your Network Load Balancers<\/a>)<\/li>\n\n\n\n<li>Determining redundancy and security workload requirements for communication between on-premises environments and the AWS Cloud (for example, by using AWS VPN, AWS VPN over Direct Connect, and MACsec)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/building-scalable-secure-multi-vpc-network-infrastructure\/direct-connect.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Direct Connect<\/a>)<\/li>\n\n\n\n<li>Identifying and removing unnecessary network access&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/best-practices.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security best practices in IAM<\/a>)<\/li>\n\n\n\n<li>Managing network configurations as requirements change (for example, by using AWS Firewall Manager)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/waf\/latest\/developerguide\/working-with-policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Working with AWS Firewall Manager policies<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 3.3: Design and implement security controls for compute workloads.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Provisioning and maintenance of EC2 instances (for example, patching, inspecting, creation of snapshots and AMIs, use of EC2 Image Builder)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/imagebuilder\/latest\/userguide\/what-is-image-builder.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is EC2 Image Builder?<\/a>)<\/li>\n\n\n\n<li>IAM instance roles and IAM service roles&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_roles.html\" target=\"_blank\" rel=\"noreferrer noopener\">IAM roles<\/a>)<\/li>\n\n\n\n<li>Services that scan for vulnerabilities in compute workloads (for example, Amazon Inspector, Amazon Elastic Container Registry [Amazon ECR])&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/inspector\/latest\/user\/scanning-ecr.html\" target=\"_blank\" rel=\"noreferrer noopener\">Scanning Amazon ECR container images with Amazon Inspector<\/a>)<\/li>\n\n\n\n<li>Host-based security (for example, firewalls, hardening)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creating hardened EC2 AMIs&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/WindowsGuide\/Creating_EBSbacked_WinAMI.html\" target=\"_blank\" rel=\"noreferrer noopener\">Create a custom Windows AMI<\/a>)<\/li>\n\n\n\n<li>Applying instance roles and service roles as appropriate to authorize compute workloads&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/iam-roles-for-amazon-ec2.html\" target=\"_blank\" rel=\"noreferrer noopener\">IAM roles for Amazon EC2<\/a>)<\/li>\n\n\n\n<li>Scanning EC2 instances and container images for known vulnerabilities&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/inspector\/latest\/user\/scanning-ec2.html\" target=\"_blank\" rel=\"noreferrer noopener\">Scanning Amazon EC2 instances with Amazon Inspector<\/a>)<\/li>\n\n\n\n<li>Applying patches across a fleet of EC2 instances or container images&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/systems-manager\/latest\/userguide\/patch-manager.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Systems Manager&nbsp;Patch Manager<\/a>)<\/li>\n\n\n\n<li>Activating host-based security mechanisms (for example, host-based firewalls)<\/li>\n\n\n\n<li>Analyzing Amazon Inspector findings and determining appropriate mitigation techniques&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/inspector\/latest\/user\/findings-understanding.html\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding findings in Amazon Inspector<\/a>)<\/li>\n\n\n\n<li>Passing secrets and credentials securely to compute workloads&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/security-creds.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS security credentials<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 3.4: Troubleshoot network security.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How to analyze reachability (for example, by using VPC Reachability Analyzer and Amazon Inspector)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/reachability\/getting-started.html\" target=\"_blank\" rel=\"noreferrer noopener\">Getting started with Reachability Analyzer<\/a>)<\/li>\n\n\n\n<li>Fundamental TCP\/IP networking concepts (for example, UDP compared with TCP, ports, Open Systems Interconnection [OSI] model, network operating system utilities)<\/li>\n\n\n\n<li>How to read relevant log sources (for example, Route 53 logs, AWS WAF logs, VPC Flow Logs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/flow-logs.html\" target=\"_blank\" rel=\"noreferrer noopener\">Logging IP traffic using VPC Flow Logs<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying, interpreting, and prioritizing problems in network connectivity (for example, by using Amazon Inspector Network Reachability)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/inspector\/v1\/userguide\/inspector_network-reachability.html\" target=\"_blank\" rel=\"noreferrer noopener\">Network Reachability<\/a>)<\/li>\n\n\n\n<li>Determining solutions to produce desired network behavior&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/config\/latest\/developerguide\/evaluate-config_use-managed-rules.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Config Managed Rules<\/a>)<\/li>\n\n\n\n<li>Analyzing log sources to identify problems&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/logs\/AnalyzingLogData.html\" target=\"_blank\" rel=\"noreferrer noopener\">Analyzing log data with CloudWatch Logs Insights<\/a>)<\/li>\n\n\n\n<li>Capturing traffic samples for problem analysis (for example, by using Traffic Mirroring)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/mirroring\/what-is-traffic-mirroring.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is Traffic Mirroring?<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 4: Identity and Access Management (16%)<\/strong><\/h4>\n\n\n\n<p>Task Statement 4.1: Design, implement, and troubleshoot authentication for AWS resources.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Methods and services for creating and managing identities (for example, federation, identity providers, AWS IAM Identity Center [AWS Single Sign-On], Amazon Cognito)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_roles_providers.html\" target=\"_blank\" rel=\"noreferrer noopener\">Identity providers and federation<\/a>)<\/li>\n\n\n\n<li>Long-term and temporary credentialing mechanisms&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/framework\/sec_identities_unique.html#:~:text=The%20only%20time%20you%20should,methods%2C%20temporary%20credentials%20are%20generated.\" target=\"_blank\" rel=\"noreferrer noopener\">Use temporary credentials<\/a>)<\/li>\n\n\n\n<li>How to troubleshoot authentication issues (for example, by using CloudTrail, IAM Access Advisor, and IAM policy simulator)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/security_iam_troubleshoot.html\" target=\"_blank\" rel=\"noreferrer noopener\">Troubleshooting AWS CloudTrail identity and access<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establishing identity through an authentication system, based on requirements&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/intro-structure.html\" target=\"_blank\" rel=\"noreferrer noopener\">How IAM works<\/a>)<\/li>\n\n\n\n<li>Setting up multi-factor authentication (MFA)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_credentials_mfa_enable-overview.html\" target=\"_blank\" rel=\"noreferrer noopener\">General steps for enabling MFA devices<\/a>)<\/li>\n\n\n\n<li>Determining when to use AWS Security Token Service (AWS STS) to issue temporary credentials&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_credentials_temp_request.html\" target=\"_blank\" rel=\"noreferrer noopener\">Requesting temporary security credentials<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 4.2: Design, implement, and troubleshoot authorization for AWS resources.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Different IAM policies (for example, managed policies, inline policies, identity-based policies, resource-based policies, session control policies)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/access_policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Policies and permissions in IAM<\/a>)<\/li>\n\n\n\n<li>Components and impact of a policy (for example, Principal, Action, Resource, Condition)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/reference_policies_elements.html\" target=\"_blank\" rel=\"noreferrer noopener\">IAM JSON policy elements reference<\/a>)<\/li>\n\n\n\n<li>How to troubleshoot authorization issues (for example, by using CloudTrail, IAM Access Advisor, and IAM policy simulator)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/security_iam_troubleshoot.html\" target=\"_blank\" rel=\"noreferrer noopener\">Troubleshooting AWS CloudTrail identity and access<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Constructing attribute-based access control (ABAC) and role-based access control (RBAC) strategies&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/introduction_attribute-based-access-control.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is ABAC for AWS?<\/a>)<\/li>\n\n\n\n<li>Evaluating IAM policy types for given requirements and workloads&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/reference_policies_evaluation-logic.html\" target=\"_blank\" rel=\"noreferrer noopener\">Policy evaluation logic<\/a>)<\/li>\n\n\n\n<li>Interpreting an IAM policy\u2019s effect on environments and workloads&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/reference_policies_variables.html\" target=\"_blank\" rel=\"noreferrer noopener\">IAM policy elements: Variables and tags<\/a>)<\/li>\n\n\n\n<li>Applying the principle of least privilege across an environment<\/li>\n\n\n\n<li>Enforcing proper separation of duties<\/li>\n\n\n\n<li>Analyzing access or authorization errors to determine cause or effect&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/what-is-access-analyzer.html\" target=\"_blank\" rel=\"noreferrer noopener\">Using AWS Identity and Access Management Access Analyzer<\/a>)<\/li>\n\n\n\n<li>Investigating unintended permissions, authorization, or privileges granted to a resource, service, or entity&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/organizations\/latest\/userguide\/orgs_permissions_overview.html\" target=\"_blank\" rel=\"noreferrer noopener\">Managing access permissions for your AWS organization<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 5: Data Protection (18%)<\/strong><\/h4>\n\n\n\n<p>Task Statement 5.1: Design and implement controls that provide confidentiality and integrity for data in transit.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TLS concepts&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/app-mesh\/latest\/userguide\/tls.html\" target=\"_blank\" rel=\"noreferrer noopener\">Transport Layer Security (TLS)<\/a>)<\/li>\n\n\n\n<li>VPN concepts (for example, IPsec)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/aws.amazon.com\/what-is\/vpn\/#:~:text=your%20internet%20traffic.-,Encryption,packet%20of%20a%20data%20stream.\" target=\"_blank\" rel=\"noreferrer noopener\">What is a VPN (Virtual Private Network)?<\/a>)<\/li>\n\n\n\n<li>Secure remote access methods (for example, SSH, RDP over Systems Manager Session Manager)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/systems-manager\/latest\/userguide\/session-manager.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Systems Manager&nbsp;Session Manager<\/a>)<\/li>\n\n\n\n<li>Systems Manager Session Manager concepts<\/li>\n\n\n\n<li>How TLS certificates work with various network services and resources (for example, CloudFront, load balancers)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/elasticloadbalancing\/latest\/network\/create-tls-listener.html\" target=\"_blank\" rel=\"noreferrer noopener\">TLS listeners for your Network Load Balancer<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Designing secure connectivity between AWS and on-premises networks (for example, by using Direct Connect and VPN gateways)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/building-scalable-secure-multi-vpc-network-infrastructure\/direct-connect.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Direct Connect&nbsp;<\/a>)<\/li>\n\n\n\n<li>Designing mechanisms to require encryption when connecting to resources (for example, Amazon RDS, Amazon Redshift, CloudFront, Amazon S3, Amazon DynamoDB, load balancers, Amazon Elastic File System [Amazon EFS], Amazon API Gateway)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonRDS\/latest\/UserGuide\/Overview.Encryption.html\" target=\"_blank\" rel=\"noreferrer noopener\">Encrypting&nbsp;Amazon RDS&nbsp;resources<\/a>)<\/li>\n\n\n\n<li>Requiring TLS for AWS API calls (for example, with Amazon S3)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/network-isolation.html\" target=\"_blank\" rel=\"noreferrer noopener\">Infrastructure security in Amazon S3<\/a>)<\/li>\n\n\n\n<li>Designing mechanisms to forward traffic over secure connections (for example, by using Systems Manager and EC2 Instance Connect)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/ec2-instance-connect-methods.html\" target=\"_blank\" rel=\"noreferrer noopener\">Connect using EC2 Instance Connect<\/a>)<\/li>\n\n\n\n<li>Designing cross-Region networking by using private VIFs and public VIFs<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 5.2: Design and implement controls that provide confidentiality and integrity for data at rest.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encryption technique selection (for example, client-side, server-side, symmetric, asymmetric)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/kms\/latest\/developerguide\/concepts.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS KMS concepts<\/a>)<\/li>\n\n\n\n<li>Integrity-checking techniques (for example, hashing algorithms, digital signatures)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/checking-object-integrity.html\" target=\"_blank\" rel=\"noreferrer noopener\">Checking object integrity<\/a>)<\/li>\n\n\n\n<li>Resource policies (for example, for DynamoDB, Amazon S3, and AWS Key Management Service [AWS KMS])&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/kms\/latest\/developerguide\/key-policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Key policies in AWS KMS<\/a>)<\/li>\n\n\n\n<li>IAM roles and policies&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/access_policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Policies and permissions in IAM<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Designing resource policies to restrict access to authorized users (for example, S3 bucket policies, DynamoDB policies)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/example-bucket-policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Examples of Amazon S3 bucket policies<\/a>)<\/li>\n\n\n\n<li>Designing mechanisms to prevent unauthorized public access (for example, S3 Block Public Access, prevention of public snapshots and public AMIs)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/access-control-block-public-access.html\" target=\"_blank\" rel=\"noreferrer noopener\">Blocking public access to your Amazon S3 storage<\/a>)<\/li>\n\n\n\n<li>Configuring services to activate encryption of data at rest (for example, Amazon S3, Amazon RDS, DynamoDB, Amazon Simple Queue Service [Amazon SQS], Amazon EBS, Amazon EFS)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AWSSimpleQueueService\/latest\/SQSDeveloperGuide\/sqs-server-side-encryption.html\" target=\"_blank\" rel=\"noreferrer noopener\">Encryption at rest in Amazon SQS<\/a>)<\/li>\n\n\n\n<li>Designing mechanisms to protect data integrity by preventing modifications (for example, by using S3 Object Lock, KMS key policies, S3 Glacier Vault Lock, and AWS Backup Vault Lock)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/object-lock.html\" target=\"_blank\" rel=\"noreferrer noopener\">Using S3 Object Lock<\/a>)<\/li>\n\n\n\n<li>Designing encryption at rest by using AWS CloudHSM for relationaldatabases (for example, Amazon RDS, RDS Custom, databases on EC2 instances)<\/li>\n\n\n\n<li>Choosing encryption techniques based on business requirements&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/strategy-data-at-rest-encryption\/welcome.html\" target=\"_blank\" rel=\"noreferrer noopener\">Creating an enterprise encryption strategy for data at rest<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 5.3: Design and implement controls to manage the lifecycle of data at rest.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lifecycle policies<\/li>\n\n\n\n<li>Data retention standards<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Designing S3 Lifecycle mechanisms to retain data for required retention periods (for example, S3 Object Lock, S3 Glacier Vault Lock, S3 Lifecycle policy)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/userguide\/object-lifecycle-mgmt.html\" target=\"_blank\" rel=\"noreferrer noopener\">Managing your storage lifecycle<\/a>)<\/li>\n\n\n\n<li>Designing automatic lifecycle management for AWS services and resources (for example, Amazon S3, EBS volume snapshots, RDS volume snapshots, AMIs, container images, CloudWatch log groups, Amazon Data Lifecycle Manager)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/ebs\/latest\/userguide\/snapshot-lifecycle.html\" target=\"_blank\" rel=\"noreferrer noopener\">Amazon Data Lifecycle Manager<\/a>)<\/li>\n\n\n\n<li>Establishing schedules and retention for AWS Backup across AWS services&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/aws-backup\/latest\/devguide\/creating-a-backup-plan.html\" target=\"_blank\" rel=\"noreferrer noopener\">Creating a backup plan<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 5.4: Design and implement controls to protect credentials, secrets, and cryptographic key materials.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secrets Manager&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/secretsmanager\/latest\/userguide\/intro.html\" target=\"_blank\" rel=\"noreferrer noopener\">What is AWS Secrets Manager?<\/a>)<\/li>\n\n\n\n<li>Systems Manager Parameter Store&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/systems-manager\/latest\/userguide\/systems-manager-parameter-store.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Systems Manager&nbsp;Parameter Store<\/a>)<\/li>\n\n\n\n<li>Usage and management of symmetric keys and asymmetric keys (for example, AWS KMS)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Designing management and rotation of secrets for workloads (for example, database access credentials, API keys, IAM access keys, AWS KMS customer managed keys)<\/li>\n\n\n\n<li>Designing KMS key policies to limit key usage to authorized users&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/kms\/latest\/developerguide\/key-policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Key policies in AWS KMS<\/a>)<\/li>\n\n\n\n<li>Establishing mechanisms to import and remove customer-provided key material&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/kms\/latest\/developerguide\/importing-keys.html\" target=\"_blank\" rel=\"noreferrer noopener\">Importing key material for AWS KMS keys<\/a>)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Domain 6: Management and Security Governance (14%)<\/strong><\/h4>\n\n\n\n<p>Task Statement 6.1: Develop a strategy to centrally deploy and manage AWS accounts.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Multi-account strategies&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/organizing-your-aws-environment\/organizing-your-aws-environment.html\" target=\"_blank\" rel=\"noreferrer noopener\">Organizing Your AWS Environment Using Multiple Accounts<\/a>)<\/li>\n\n\n\n<li>Managed services that allow delegated administration&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/organizations\/latest\/userguide\/orgs_integrate_services_list.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS services that you can use with AWS Organizations<\/a>)<\/li>\n\n\n\n<li>Policy-defined guardrails<\/li>\n\n\n\n<li>Root account best practices&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/root-user-best-practices.html\" target=\"_blank\" rel=\"noreferrer noopener\">Root user best practices for your AWS account<\/a>)<\/li>\n\n\n\n<li>Cross-account roles&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/tutorial_cross-account-with-roles.html\" target=\"_blank\" rel=\"noreferrer noopener\">Delegate access across AWS accounts using IAM roles<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploying and configuring AWS Organizations&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/organizations\/latest\/userguide\/orgs_tutorials_basic.html\" target=\"_blank\" rel=\"noreferrer noopener\">Creating and configuring an organization<\/a>)<\/li>\n\n\n\n<li>Determining when and how to deploy AWS Control Tower (for example, which services must be deactivated for successful deployment)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/aws-control-tower\/deploy.html\" target=\"_blank\" rel=\"noreferrer noopener\">Deploying AWS Control Tower in an AWS Landing Zone organization<\/a>)<\/li>\n\n\n\n<li>Implementing SCPs as a technical solution to enforce a policy (for example, limitations on the use of a root account, implementation of controls in AWS Control Tower)<\/li>\n\n\n\n<li>Centrally managing security services and aggregating findings (for example, by using delegated administration and AWS Config aggregators)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/securityhub\/latest\/userguide\/central-configuration-intro.html\" target=\"_blank\" rel=\"noreferrer noopener\">How central configuration works<\/a>)<\/li>\n\n\n\n<li>Securing AWS account root user credentials&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/security-creds.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS security credentials<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 6.2: Implement a secure and consistent deployment strategy for cloud resources.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deployment best practices with infrastructure as code (IaC) (for example, AWS CloudFormation template hardening and drift detection)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AWSCloudFormation\/latest\/UserGuide\/best-practices.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS CloudFormation best practices<\/a>)<\/li>\n\n\n\n<li>Best practices for tagging&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/tagging-best-practices\/tagging-best-practices.html\" target=\"_blank\" rel=\"noreferrer noopener\">Best Practices for Tagging AWS Resources<\/a>)<\/li>\n\n\n\n<li>Centralized management, deployment, and versioning of AWS services<\/li>\n\n\n\n<li>Visibility and control over AWS infrastructure<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using CloudFormation to deploy cloud resources consistently and securely&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AWSCloudFormation\/latest\/UserGuide\/best-practices.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS CloudFormation best practices<\/a>)<\/li>\n\n\n\n<li>Implementing and enforcing multi-account tagging strategies&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/tagging-best-practices\/implementing-and-enforcing-tagging.html\" target=\"_blank\" rel=\"noreferrer noopener\">Implementing and enforcing tagging<\/a>)<\/li>\n\n\n\n<li>Configuring and deploying portfolios of approved AWS services (for example, by using AWS Service Catalog)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/prescriptive-guidance\/latest\/patterns\/automate-aws-service-catalog-portfolio-and-product-deployment-by-using-aws-cdk.html\" target=\"_blank\" rel=\"noreferrer noopener\">Automate AWS Service Catalog portfolio and product deployment by using AWS CDK<\/a>)<\/li>\n\n\n\n<li>Organizing AWS resources into different groups for management&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/ARG\/latest\/userguide\/resource-groups.html#:~:text=Sign%20in%20to%20the%20AWS,to%20create%20a%20new%20one.\" target=\"_blank\" rel=\"noreferrer noopener\">What are resource groups?<\/a>)<\/li>\n\n\n\n<li>Deploying Firewall Manager to enforce policies&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/waf\/latest\/developerguide\/working-with-policies.html\" target=\"_blank\" rel=\"noreferrer noopener\">Working with AWS Firewall Manager policies<\/a>)<\/li>\n\n\n\n<li>Securely sharing resources across AWS accounts (for example, by using AWS Resource Access Manager [AWS RAM])&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/ram\/latest\/userguide\/shareable.html#:~:text=AWS%20Network%20Firewall-,You%20can%20share%20the%20following%20AWS,resources%20by%20using%20AWS%20RAM.&amp;text=Create%20and%20manage%20firewall%20policies,%2C%20protection%2C%20and%20filtering%20behaviors.\" target=\"_blank\" rel=\"noreferrer noopener\">Shareable AWS resources<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 6.3: Evaluate the compliance of AWS resources.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data classification by using AWS services&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/data-classification\/data-classification-overview.html\" target=\"_blank\" rel=\"noreferrer noopener\">Data classification overview<\/a>)<\/li>\n\n\n\n<li>How to assess, audit, and evaluate the configurations of AWS resources (for example, by using AWS Config)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/config\/latest\/developerguide\/evaluate-config.html\" target=\"_blank\" rel=\"noreferrer noopener\">Evaluating Resources with AWS Config Rules<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying sensitive data by using Macie&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/macie\/latest\/user\/data-classification.html\" target=\"_blank\" rel=\"noreferrer noopener\">Discovering sensitive data with Amazon Macie<\/a>)<\/li>\n\n\n\n<li>Creating AWS Config rules for detection of noncompliant AWS resources&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/config\/latest\/developerguide\/remediation.html\" target=\"_blank\" rel=\"noreferrer noopener\">Remediating Noncompliant Resources with AWS Config Rules<\/a>)<\/li>\n\n\n\n<li>Collecting and organizing evidence by using Security Hub and AWS Audit Manager&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/audit-manager\/latest\/userguide\/review-evidence.html\" target=\"_blank\" rel=\"noreferrer noopener\">Reviewing the evidence in an assessment<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Task Statement 6.4: Identify security gaps through architectural reviews and cost analysis.<\/p>\n\n\n\n<p>Knowledge of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>AWS cost and usage for anomaly identification&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/cost-management\/latest\/userguide\/getting-started-ad.html\" target=\"_blank\" rel=\"noreferrer noopener\">Getting started with AWS Cost Anomaly Detection<\/a>)<\/li>\n\n\n\n<li>Strategies to reduce attack surfaces&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/whitepapers\/latest\/aws-best-practices-ddos-resiliency\/attack-surface-reduction.html#:~:text=Resources%20that%20are%20not%20exposed,not%20accessible%20from%20the%20internet.\" target=\"_blank\" rel=\"noreferrer noopener\">Attack surface reduction<\/a>)<\/li>\n\n\n\n<li>AWS Well-Architected Framework&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/framework\/welcome.html\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Well-Architected Framework<\/a>)<\/li>\n<\/ul>\n\n\n\n<p>Skills in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying anomalies based on resource utilization and trends&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/monitoring\/CloudWatch_Anomaly_Detection.html\" target=\"_blank\" rel=\"noreferrer noopener\">Using CloudWatch anomaly detection<\/a>)<\/li>\n\n\n\n<li>Identifying unused resources by using AWS services and tools (for example, AWS Trusted Advisor, AWS Cost Explorer)&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/cost-management\/latest\/userguide\/ce-what-is.html\" target=\"_blank\" rel=\"noreferrer noopener\">Analyzing your costs with AWS Cost Explorer<\/a>)<\/li>\n\n\n\n<li>Using the AWS Well-Architected Tool to identify security gaps&nbsp;<strong>(AWS Documentation:<\/strong>&nbsp;<a href=\"https:\/\/docs.aws.amazon.com\/wellarchitected\/latest\/userguide\/security.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security in AWS Well-Architected Tool<\/a>)<\/li>\n<\/ul>\n\n\n\n<p><em>Are you feeling anxious given the vast syllabus this exam covers? Don&#8217;t worry as we have the perfect solution for you in the next section<\/em>&#8211; The AWS certified security specialty Study Guide!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>AWS Certified Security Specialty<\/strong> <strong>Preparatory Resources<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"750\" height=\"400\" src=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Copy-of-Copy-of-Collab-Space-Central.png\" alt=\"AWS Certified Security Specialty preparatory resources\" class=\"wp-image-14863\" srcset=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Copy-of-Copy-of-Collab-Space-Central.png 750w, https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Copy-of-Copy-of-Collab-Space-Central-300x160.png 300w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure>\n<\/div>\n\n\n<p>AWS certified security specialty preparation is definitely a big task. It is difficult to comprehend each and every concept. Being consistent with your preparations is the key. Also with access to the right resources, you can ace the exam and pass it with flying colours. We have done the tedious task of summarising the best resources for your preparations below:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>1. AWS Certified Security Specialty<\/strong> <strong>White Papers<\/strong><\/h4>\n\n\n\n<p>When preparing for the AWS you can also take the help of amazon whitepapers for preparation. The whitepapers are the authentic study resources that we can surely vouch for. These are basically the pdf formats of the topics which you can find on the official page of amazon certifications. Whitepapers not only strengthen your preparation process but also helps you build a strong strategy to lay your focus on. AWS offers<a rel=\"noreferrer noopener\" href=\"https:\/\/d1.awsstatic.com\/training-and-certification\/docs-security-spec\/AWS-Certified-Security-Speciality_Sample-Questions.pdf\" target=\"_blank\">&nbsp;sample papers<\/a>&nbsp;to assist the candidates with acquiring additional knowledge and skills to prepare for the certification exams.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>2. AWS Certified Security Specialty<\/strong> <strong>Online Course<\/strong><\/h4>\n\n\n\n<p>Getting ready for an exam can be stressful, but Online Courses can make it easier. The <a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-online-course\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>AWS Security Specialty Online Course<\/strong><\/a> offers comprehensive coverage, including 23+ hours of learning videos for all course objectives and three scenario-based lab sessions. You also get access to the latest updated content with unlimited lifetime accessibility.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-online-course\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"961\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-18.png\" alt=\"AWS Security Specialty Online Course\" class=\"wp-image-14846\" srcset=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-18.png 961w, https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-18-300x47.png 300w\" sizes=\"(max-width: 961px) 100vw, 961px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>3. AWS Security Specialty<\/strong> <strong>Books<\/strong><\/h4>\n\n\n\n<p>The AWS certified security specialty book are a perennial source available for learning.&nbsp;Also, ooks have been an age old tradition and essential ingredient when it comes to preparing for any exam. They provide deep understanding of the exam concepts. Also,  books offer real life scenarios that help you prepare for a practical exam. Some of the books that can arm you are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firstly, AWS Certified Security Specialty Workbook: Exam SCS-C01 by IP Specialist<\/li>\n\n\n\n<li>Secondly, AWS Certified Advanced Networking Official Study Guide: Specialty Exam by Sidhartha Chauhan<\/li>\n\n\n\n<li>Thirdly, Mastering AWS Security: Create and maintain a secure cloud ecosystem by Albert Anthony<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>4. AWS Security Specialty<\/strong> <strong>Online Tutorials<\/strong><\/h4>\n\n\n\n<p><strong><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/\" target=\"_blank\" rel=\"noreferrer noopener\">Online Tutorials<\/a><\/strong> provide all information you need to pass the exam. They are easy to digest and offer a roadmap for your success. Also, they equip you with the right strategy to clear the exam. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/tutorial\/aws-certified-security-specialty\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"961\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-16.png\" alt=\" AWS Certified Security Specialty Exam  online tutorials\" class=\"wp-image-14844\" srcset=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-16.png 961w, https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-16-300x47.png 300w\" sizes=\"(max-width: 961px) 100vw, 961px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>5. Practice with hands-on experience<\/strong><\/h4>\n\n\n\n<p>In addition to studying the official materials, it&#8217;s important to gain hands-on experience with AWS security services. Practice setting up and configuring AWS security services to gain a better understanding of how they work and how they can be used to secure workloads.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>6. Evaluate yourself with Practice Tests<\/strong><\/h4>\n\n\n\n<p>AWS certified security-specialty practice exams are very helpful in minimizing errors when preparing. These&nbsp;tests provide the necessary simulation for the brain to become used to the actual exam. They help you see your weaknesses and motivate you to improve them. The most crucial thing to remember is to practice tests once you have read the entire curriculum. Also, taking several practice exams can increase your confidence. Try outperforming yourself with each subsequent test. <a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-free-practice-test\" target=\"_blank\" rel=\"noreferrer noopener\">Get Ready to Self Evaluate your preparations with Practice Tests!<\/a><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-free-practice-test\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"961\" height=\"150\" src=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-17.png\" alt=\" AWS Certified Security Specialty Exam  free practice tests\" class=\"wp-image-14843\" srcset=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-17.png 961w, https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Free-Practice-Tests-17-300x47.png 300w\" sizes=\"(max-width: 961px) 100vw, 961px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>7. Focus on the details<\/strong><\/h4>\n\n\n\n<p>The exam can include questions that require you to know specific details about AWS security services and their configurations. Make sure you understand the details of each service and how they can be configured to meet specific security requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Expert Corner<\/strong><\/h3>\n\n\n\n<p>AWS Certified Security Specialty certification exam is highly regarded in the industry as it is one of the most sought-after certifications for cloud security professionals. Here are some expert views on the certification exam:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Industry recognition: The AWS Certified Security Specialty certification is highly recognized in the industry as a mark of expertise in AWS security services and best practices. According to Michael Sheehan, founder of the Cloud Computing Group, certification can make individuals stand out in a tough job market, showing their dedication to ongoing learning and professional growth.<\/li>\n\n\n\n<li>Relevant and up-to-date content: The certification exam covers a wide range of AWS security topics, including identity and access management, network security, data protection, and incident response. The content of the exam is regularly updated to reflect the latest AWS security services and best practices.<\/li>\n\n\n\n<li>Technical skills validation: According to Alex Hilton, CEO of the Cloud Industry Forum, the certification is a way to validate an individual&#8217;s technical skills and knowledge of AWS security services. It demonstrates to employers that the individual has a deep understanding of how to secure workloads on the AWS platform.<\/li>\n\n\n\n<li>Career advancement: According to Simon Johnson, founder of AWS training provider Cloud Academy, the certification can help individuals advance their careers and earn higher salaries. Employers often look for individuals with certifications to fill specialized roles, and the certification can lead to new opportunities and higher salaries.<\/li>\n\n\n\n<li>Personal satisfaction: According to Danilo Poccia, Chief Evangelist at Amazon Web Services, earning the certification can be a source of personal satisfaction and achievement. It demonstrates a commitment to continuous learning and professional development and can help individuals build confidence in their skills and abilities.<\/li>\n<\/ul>\n\n\n\n<p>Overall, the AWS Certified Security Specialty certification is highly regarded in the industry as a mark of expertise in AWS security services and best practices. It can help individuals validate their technical skills, advance their careers, and achieve personal satisfaction and achievement.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>Advance your skills with the exam. Start your preparations for&nbsp;<a href=\"https:\/\/www.testpreptraining.ai\/aws-certified-security-specialty-questions\" target=\"_blank\" rel=\"noreferrer noopener\">AWS Certified Security Specialty Exam&nbsp;<\/a>Now!<\/strong><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>AWS Certified Security Specialty certification can be a valuable credential for security professionals with experience in AWS who are looking to demonstrate their expertise and advance their careers in this field. Companies worldwide are swiftly shifting their operations to the cloud, making cloud computing a crucial capability. Getting certified with AWS Certified Security Specialty is&#8230;<\/p>\n","protected":false},"author":1,"featured_media":14845,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[3855,1162,2342,3857,1161,3856,2343,1160],"class_list":["post-14842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws","tag-aws-certified-security-specialty","tag-aws-certified-security-specialty-exam-resources","tag-aws-certified-security-specialty-exam","tag-aws-certified-security-specialty-exam-format","tag-aws-certified-security-specialty-exam-guide","tag-aws-certified-security-specialty-exam-training","tag-aws-certified-security-specialty-resources","tag-aws-certified-security-specialty-study-guide"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is AWS Certified Security Specialty certification worth it? - Blog<\/title>\n<meta name=\"description\" content=\"Demonstrate your skills and get ready for the AWS Certified Security Specialty exam. Satrt preparing with free practice tests now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is AWS Certified Security Specialty certification worth it? - Blog\" \/>\n<meta property=\"og:description\" content=\"Demonstrate your skills and get ready for the AWS Certified Security Specialty exam. Satrt preparing with free practice tests now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-06T22:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-06T08:55:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Copy-of-Certified-Human-Rights-Law-Professional.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TestPrepTraining\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TestPrepTraining\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/\",\"url\":\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/\",\"name\":\"Is AWS Certified Security Specialty certification worth it? - Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#website\"},\"datePublished\":\"2021-03-06T22:30:00+00:00\",\"dateModified\":\"2024-06-06T08:55:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c\"},\"description\":\"Demonstrate your skills and get ready for the AWS Certified Security Specialty exam. Satrt preparing with free practice tests now!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.testpreptraining.ai\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is AWS Certified Security Specialty certification worth it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#website\",\"url\":\"https:\/\/www.testpreptraining.ai\/blog\/\",\"name\":\"Learning Resources\",\"description\":\"Testprep Training Blogs\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.testpreptraining.ai\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c\",\"name\":\"TestPrepTraining\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g\",\"caption\":\"TestPrepTraining\"},\"description\":\"Testprep Training offers a wide range of practice exams and online courses for Professional certification exam curated by field experts and working professionals. Evaluate your skills and build confidence to appear for the exam.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is AWS Certified Security Specialty certification worth it? - Blog","description":"Demonstrate your skills and get ready for the AWS Certified Security Specialty exam. Satrt preparing with free practice tests now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/","og_locale":"en_US","og_type":"article","og_title":"Is AWS Certified Security Specialty certification worth it? - Blog","og_description":"Demonstrate your skills and get ready for the AWS Certified Security Specialty exam. Satrt preparing with free practice tests now!","og_url":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/","og_site_name":"Blog","article_published_time":"2021-03-06T22:30:00+00:00","article_modified_time":"2024-06-06T08:55:27+00:00","og_image":[{"width":750,"height":400,"url":"https:\/\/www.testpreptraining.ai\/blog\/wp-content\/uploads\/2021\/03\/Copy-of-Certified-Human-Rights-Law-Professional.png","type":"image\/png"}],"author":"TestPrepTraining","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TestPrepTraining","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/","url":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/","name":"Is AWS Certified Security Specialty certification worth it? - Blog","isPartOf":{"@id":"https:\/\/www.testpreptraining.ai\/blog\/#website"},"datePublished":"2021-03-06T22:30:00+00:00","dateModified":"2024-06-06T08:55:27+00:00","author":{"@id":"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c"},"description":"Demonstrate your skills and get ready for the AWS Certified Security Specialty exam. Satrt preparing with free practice tests now!","breadcrumb":{"@id":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.testpreptraining.ai\/blog\/is-aws-certified-security-specialty-certification-worth-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.testpreptraining.ai\/blog\/"},{"@type":"ListItem","position":2,"name":"Is AWS Certified Security Specialty certification worth it?"}]},{"@type":"WebSite","@id":"https:\/\/www.testpreptraining.ai\/blog\/#website","url":"https:\/\/www.testpreptraining.ai\/blog\/","name":"Learning Resources","description":"Testprep Training Blogs","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.testpreptraining.ai\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/b46daaf932dbfb07cbe7db807006780c","name":"TestPrepTraining","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.testpreptraining.ai\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4cd4f7acc79865d9ba457114e386c039833599aae3707598a92eda256c6a5278?s=96&d=mm&r=g","caption":"TestPrepTraining"},"description":"Testprep Training offers a wide range of practice exams and online courses for Professional certification exam curated by field experts and working professionals. Evaluate your skills and build confidence to appear for the exam."}]}},"_links":{"self":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts\/14842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/comments?post=14842"}],"version-history":[{"count":15,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts\/14842\/revisions"}],"predecessor-version":[{"id":35631,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/posts\/14842\/revisions\/35631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/media\/14845"}],"wp:attachment":[{"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/media?parent=14842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/categories?post=14842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testpreptraining.ai\/blog\/wp-json\/wp\/v2\/tags?post=14842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}