CertNova
Menu
<- Back to glossary

AWS Certified Security - Specialty (SCS-C02) glossary

Terms selected for AWS Certified Security - Specialty (SCS-C02) based on common objective language and practice focus.

Network ACL

A Network Access Control List (ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets.

Read full term ->

AWS Organizations

AWS Organizations allows you to centrally manage and govern your environment as you grow and scale your AWS resources. It helps in setting up and managing multiple AWS accounts.

Read full term ->

AWS CloudTrail

AWS CloudTrail is a service that enables governance, compliance, and operational and risk auditing of your AWS account. It continuously logs and retains account activity related to actions across your AWS infrastructure.

Read full term ->

AWS CloudWatch

AWS CloudWatch is a monitoring and observability service that provides data and actionable insights to monitor applications, respond to system-wide performance changes, and optimize resource utilization.

Read full term ->

AWS Config

AWS Config provides a detailed view of the configuration of AWS resources in your account, including how resources are related to one another and how they were configured in the past.

Read full term ->

AWS EKS Security

AWS EKS Security involves implementing security best practices for Amazon Elastic Kubernetes Service (EKS) to protect Kubernetes clusters and workloads.

Read full term ->

AWS Single Sign-On (SSO)

AWS Single Sign-On (SSO) enables centralized management of access to multiple AWS accounts and business applications using a single set of credentials.

Read full term ->

AWS Systems Manager

AWS Systems Manager provides a unified user interface to view operational data from multiple AWS services and allows you to automate operational tasks across AWS resources.

Read full term ->

KMS Customer Managed Keys

Customer Managed Keys (CMKs) are KMS keys that you create, own, and manage. They provide full control over the key lifecycle, including rotation, deletion, and access permissions.

Read full term ->

S3 Bucket Policies

S3 Bucket Policies are resource-based policies that allow you to grant specific permissions to your S3 buckets and objects.

Read full term ->

Centralized Security Logging

Pattern for collecting and retaining audit and security logs from multiple accounts into controlled destinations.

Read full term ->

AWS CloudHSM

Managed hardware security module service for cryptographic key operations with dedicated hardware control.

Read full term ->

Data Perimeter

Control strategy using identity, network, and resource policies to keep data access within trusted boundaries.

Read full term ->

Amazon Detective

Investigation service that correlates security data to accelerate root-cause analysis.

Read full term ->

Envelope Encryption

Pattern that encrypts data with a data key and protects the data key with a master key.

Read full term ->

Amazon GuardDuty

Threat detection service that analyzes logs and telemetry to identify suspicious activity and potential compromise.

Read full term ->

IAM Access Analyzer

Service that identifies resources shared externally and helps validate least-privilege access intent.

Read full term ->

IAM Permission Boundary

Policy type that sets maximum permissions an IAM principal can receive through attached policies.

Read full term ->

Incident Response Playbook

Predefined set of detection, containment, eradication, and recovery steps for security incidents.

Read full term ->

Amazon Inspector

Automated vulnerability management service for EC2, ECR, and Lambda package scanning.

Read full term ->

KMS Key Policy

Primary authorization document controlling how principals can use and administer a KMS key.

Read full term ->

Amazon Macie

Data security service that discovers and classifies sensitive data in S3 using machine learning and pattern matching.

Read full term ->

SCP Guardrails

Organization-level preventive controls that restrict disallowed actions across member accounts.

Read full term ->

Secrets Rotation Policy

Defined cadence and process for rotating credentials to reduce key and password exposure risk.

Read full term ->

AWS Security Hub

Centralized security posture service that aggregates findings and compliance checks across AWS accounts.

Read full term ->

AWS Shield Advanced

Enhanced DDoS protection service with advanced detection, response support, and cost protections.

Read full term ->

AWS WAF Managed Rules

Prebuilt web ACL rule groups that help protect applications from common web exploits.

Read full term ->

Zero Trust

Security model that assumes no implicit trust and continuously verifies identity, device, and context for every request.

Read full term ->

Security Groups

Security Groups act as a virtual firewall for your instance to control inbound and outbound traffic. They are used to secure network access at the instance level.

Read full term ->

VPC Flow Logs

Logs that record a sample of network flows sent from and received by VM instances, useful for monitoring, forensics, and security analysis.

Read full term ->
Start practice for SCS-C02