{"version":1,"pages":[{"id":"kzTlst3tKo255yz4YpDi","title":"Welcome to AWS In Practice by IT Assist Labs!","pathname":"/","siteSpaceId":"sitesp_qQOE7","icon":"hand-wave"},{"id":"YWEj4jkcHkvUAcasdQTB","title":"AWS Powered E-commerce Application: A Guided Tour","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"}]},{"id":"YSva6cTwXq2fRJVlHFO7","title":"Lesson Learning Paths","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-learning-paths","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"}]},{"id":"pagA1wdLyM99WaLjQzwD","title":"Lesson Learning Paths - Certification Prep","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-learning-paths/lesson-learning-paths-certification-prep","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Learning Paths"}]},{"id":"xPQKkOV3pIfjMiWRrBWq","title":"Lesson Learning Paths - Interview Prep","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-learning-paths/lesson-learning-paths-interview-prep","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Learning Paths"}]},{"id":"2JM9lKbxaFLzTfdNS8GJ","title":"Lesson Summaries","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"}]},{"id":"g4oIL1UzitcSxogxXC8r","title":"Introduction","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/introduction","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"}]},{"id":"1ZuBlmjX8GDokSNz1ZAI","title":"E-commerce Application Architecture","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/introduction/e-commerce-application-architecture","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Introduction"}]},{"id":"Mmi0aVEeLMzAQBSyETim","title":"Multi-Account Strategy","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/multi-account-strategy","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"}]},{"id":"InrJQvoawlR9w9pKTmol","title":"Multi-Account Strategy Overview","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/multi-account-strategy/multi-account-strategy-overview","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Multi-Account Strategy"}]},{"id":"8IrCtWFeoK4PhkMz77x4","title":"Organization Units","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/multi-account-strategy/organization-units","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Multi-Account Strategy"}]},{"id":"YJU1mdrdgmBbjbDjBPgC","title":"Core Accounts","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/multi-account-strategy/core-accounts","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Multi-Account Strategy"}]},{"id":"qYi1xuo51x3h5FrxyctK","title":"Core Microservices","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/core-microservices","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"}]},{"id":"fgLPDeoFRxIGSkV4YKSM","title":"Services Overview","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/core-microservices/services-overview","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Core Microservices"}]},{"id":"1WS0G7krKIUH9cC2eVHD","title":"AWS Well-Architected design framework application","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/core-microservices/aws-well-architected-design-framework-application","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Core Microservices"}]},{"id":"Kb4rT8J5eH1WBDBMkoVL","title":"Site Reliability Engineering Application","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/core-microservices/site-reliability-engineering-application","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Core Microservices"}]},{"id":"48XfJAMjyOyV1AbTPxyq","title":"DevOps Application","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/core-microservices/devops-application","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Core Microservices"}]},{"id":"FoQ9YeSXAd77XDBKehxU","title":"Monitoring, Logging and Observability Application","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/core-microservices/monitoring-logging-and-observability-application","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"Core Microservices"}]},{"id":"mwvY1HYXqwmGUJf72K7v","title":"AWS Service By Layer","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/aws-service-by-layer","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"}]},{"id":"2zy7ttVqt9jwkp4NYUdb","title":"AWS Service By Layer Overview","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/aws-service-by-layer/aws-service-by-layer-overview","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"AWS Service By Layer"}]},{"id":"tqP3L785OAdmmpTs8ptg","title":"Presentation Layer","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/aws-service-by-layer/presentation-layer","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"AWS Service By Layer"}]},{"id":"lHEhFoBFgBsZYN3HKkEY","title":"Business Logic Layer","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/aws-service-by-layer/business-logic-layer","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"AWS Service By Layer"}]},{"id":"bb7Gr5rnUgbpiZz6jMq0","title":"Data Layer","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/aws-service-by-layer/data-layer","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"AWS Service By Layer"}]},{"id":"UZlCfNFTANkp2KctXe38","title":"E-commerce Application Use Cases","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/e-commerce-application-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"}]},{"id":"u6KgnfCULcmRDpOPK6fO","title":"E-commerce Application Use Cases","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/e-commerce-application-use-cases/e-commerce-application-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"E-commerce Application Use Cases"}]},{"id":"PqgHOGUblUtGWU4BT8cy","title":"Roles","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-summaries/e-commerce-application-use-cases/roles","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"},{"label":"Lesson Summaries"},{"label":"E-commerce Application Use Cases"}]},{"id":"c73DEAqORDUx0AroUtYh","title":"Lesson Content Navigation Demonstration","pathname":"/courses/aws-powered-e-commerce-application-a-guided-tour/lesson-content-navigation-demonstration","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"},{"label":"AWS Powered E-commerce Application: A Guided Tour"}]},{"id":"DpILMyDdfR4bSHD5ESaJ","title":"Explore a Live AWS Environment Powering an E-commerce Application","pathname":"/courses/explore-a-live-aws-environment-powering-an-e-commerce-application","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Courses"}]},{"id":"qm7p7JEJK14PqXT565mz","title":"AWS Certification Guide","pathname":"/resources/aws-certification-guide","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"}]},{"id":"rcepF3zhtTdQZVPT3fh3","title":"Concepts","pathname":"/resources/aws-certification-guide/concepts","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"AWS Certification Guide"}]},{"id":"uTyg5QjPT3bwDf3TLrnG","title":"Security, Identity & Compliance","pathname":"/resources/aws-certification-guide/concepts/security-identity-and-compliance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"AWS Certification Guide"},{"label":"Concepts"}]},{"id":"4lZ2XeP0hzgAzhzQNMeY","title":"AWS IAM-Related Concepts in Certification Exams","pathname":"/resources/aws-certification-guide/concepts/security-identity-and-compliance/aws-iam-related-concepts-in-certification-exams","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"AWS Certification Guide"},{"label":"Concepts"},{"label":"Security, Identity & Compliance"}]},{"id":"csOlgEFoi34xXMVY6xPe","title":"Design High-Performing Architectures","pathname":"/resources/aws-certification-guide/concepts/design-high-performing-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"AWS Certification Guide"},{"label":"Concepts"}]},{"id":"0vUy4KLVn5Zl9kwwxgUO","title":"Designing a high-performing architecture with EC2 and Auto Scaling Groups (ASGs)","pathname":"/resources/aws-certification-guide/concepts/design-high-performing-architectures/designing-a-high-performing-architecture-with-ec2-and-auto-scaling-groups-asgs","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"AWS Certification Guide"},{"label":"Concepts"},{"label":"Design High-Performing Architectures"}]},{"id":"AAnVSBb1EwMIOwpBs4Ul","title":"Insights","pathname":"/resources/insights","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"}]},{"id":"3RME4nqxYGeE3xuRAltw","title":"Zero Trust Architecture (ZTA)","pathname":"/resources/insights/zero-trust-architecture-zta","siteSpaceId":"sitesp_qQOE7","description":"A security framework that assumes no user, device, or system—inside or outside the network—should be inherently trusted","breadcrumbs":[{"label":"Resources"},{"label":"Insights"}]},{"id":"g8aYnvld9d0YiThknDdS","title":"Implementing a Zero Trust Architecture(ZTA) with AWS","pathname":"/resources/insights/implementing-a-zero-trust-architecture-zta-with-aws","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"Insights"}]},{"id":"iMpqNkTabUQi8lq9RqPI","title":"The Modern Application Development Lifecycle - Blue/Green Deployments","pathname":"/resources/insights/the-modern-application-development-lifecycle-blue-green-deployments","siteSpaceId":"sitesp_qQOE7","description":"","breadcrumbs":[{"label":"Resources"},{"label":"Insights"}]},{"id":"oqomzOQyYSiLxvdGKZCC","title":"Microservices Communication Patterns","pathname":"/resources/insights/microservices-communication-patterns","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"Insights"}]},{"id":"xnKFABbIvv8qBeDrI6xB","title":"Interview Preparation","pathname":"/resources/interview-preparation","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"}]},{"id":"eTIHn0xIjX8foeFsoHS7","title":"AWS Solutions Archictect","pathname":"/resources/interview-preparation/aws-solutions-archictect","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Resources"},{"label":"Interview Preparation"}]},{"id":"ylwO1s4yVWU4zKmWVc2n","title":"Use Cases","pathname":"/aws-exploration/use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"PvHGObdSP9QGP64HDGN6","title":"Multi-Region Resiliency with Active-Active Setup","pathname":"/aws-exploration/use-cases/multi-region-resiliency-with-active-active-setup","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"},{"label":"Use Cases"}]},{"id":"CIjmrV0jYcbj0Uu3Rlbm","title":"Exploration Summary","pathname":"/aws-exploration/use-cases/multi-region-resiliency-with-active-active-setup/exploration-summary","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"},{"label":"Use Cases"},{"label":"Multi-Region Resiliency with Active-Active Setup"}]},{"id":"rh1SwNKsZeKPAe7heYOD","title":"Foundational Solutions Architect Use Cases","pathname":"/aws-exploration/foundational-solutions-architect-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"oCX8uZBp0AaubLcYn7Rv","title":"Security Engineer / Cloud Security Architect Use Cases","pathname":"/aws-exploration/security-engineer-cloud-security-architect-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"VXBXmc8S49busYYRW3Uj","title":"DevOps / Site Reliability Engineer (SRE) Use Cases","pathname":"/aws-exploration/devops-site-reliability-engineer-sre-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"Gf7kXg0JwS86YqqOb9On","title":"Cloud Engineer / Cloud Developer","pathname":"/aws-exploration/cloud-engineer-cloud-developer","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"DkZqNDJQYK9T6jNVw2e2","title":"Data Engineer Use Cases","pathname":"/aws-exploration/data-engineer-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"PlU7rOjmS8wb1KDvZsAN","title":"Machine Learning Engineer / AI Practitioner Use Cases","pathname":"/aws-exploration/machine-learning-engineer-ai-practitioner-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"N8WiJjf57yHCsX2t5seB","title":"Network Engineer (Cloud) Use Cases","pathname":"/aws-exploration/network-engineer-cloud-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"5h68pG0IrneFJ4Y25gE9","title":"Cost Optimization / FinOps Practitioner Use Cases","pathname":"/aws-exploration/cost-optimization-finops-practitioner-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"DOB1pbNeB76BIAffISVC","title":"IT Operations / Systems Administrator Use Cases","pathname":"/aws-exploration/it-operations-systems-administrator-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"AWS Exploration"}]},{"id":"TwYfsMIKce2LNYyAA6Jt","title":"AWS Certified Solutions Architect - Associate","pathname":"/study-group/aws-certified-solutions-architect-associate","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"}]},{"id":"zkpQFp4gfvqsn10DvDux","title":"Study Guide Introduction","pathname":"/study-group/aws-certified-solutions-architect-associate/study-guide-introduction","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"}]},{"id":"58oVSREjkcnLa0AH6iwk","title":"Domain 1: Design Secure Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"}]},{"id":"1TAL667Bmy8mwkiQJYOM","title":"Task Statement 1.1: Design secure access to AWS resources","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"}]},{"id":"GVbsbVFjdXc15A7bsgXS","title":"SecureCart's Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/securecarts-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"049ybYN2GVCSwG8GCek2","title":"AWS Identity & Access Management (IAM) Fundamentals","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/aws-identity-and-access-management-iam-fundamentals","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"y4IbuGIEXD7SSZLd46Ac","title":"AWS Security Token Service (STS)","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/aws-security-token-service-sts","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"lly1TFq2J8r6YQUisyvl","title":"AWS Organization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/aws-organization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"1FJ32hjfxYZej1G9BjuT","title":"IAM Identity Center","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/iam-identity-center","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"2SYUWPCLFUKI1L6Q0eoN","title":"AWS Policies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/aws-policies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"SfZm5cqhxUzO79m1k3EN","title":"Federated Access","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/federated-access","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"d4i0pfkhdRWxkB7chyei","title":"Directory Service","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/directory-service","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"VfNtFNBA2Q68lNCvja6M","title":"Managing Access Across Multiple Accounts","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/managing-access-across-multiple-accounts","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"7heEbsgBUwSx40YtAGN3","title":"Authorization Models in IAM","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/authorization-models-in-iam","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"afiKsRAUgypSN7bcH8v3","title":"AWS Control Tower","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/aws-control-tower","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"SJUwHtH0f4mCXX2blp6Z","title":"AWS Service Control Policies (SCPs)","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/aws-service-control-policies-scps","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"BdhOH9rfuMYSIhCbRDS1","title":"Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"}]},{"id":"IsEu5T2tEfOML1Hs9ytm","title":"Using IAM Policies and Tags for Access Control in AWS","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.1-design-secure-access-to-aws-resources/use-cases/using-iam-policies-and-tags-for-access-control-in-aws","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.1: Design secure access to AWS resources"},{"label":"Use Cases"}]},{"id":"SZftVZw5vF3WWLfJlO4U","title":"Task Statement 1.2: Design Secure Workloads and Applications","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"}]},{"id":"wHjf3MlQB7fbg09pf1P8","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"ukW2uPnyIvowPpYVWGuz","title":"Application Configuration & Credential Security","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/application-configuration-and-credential-security","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"nC34oDDiKF4bpsqvlkbN","title":"Copy of Application Configuration & Credential Security","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/copy-of-application-configuration-and-credential-security","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"wfkTB5RmbKTuh0GRuGQf","title":"Network Segmentation Strategies & Traffic Control","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/network-segmentation-strategies-and-traffic-control","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"10ISpGyWCCIbT2XCgwo1","title":"Securing Network Traffic & AWS Service Endpoints","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/securing-network-traffic-and-aws-service-endpoints","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"QXNQiXI55Or7WXYor5JB","title":"Protecting Applications from External Threats","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/protecting-applications-from-external-threats","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"XPHOn6Y9KKhYo440xiZV","title":"Securing External Network Connections","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/securing-external-network-connections","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"5yrq3aReYUnh2Y1W8pWl","title":"AWS Network Firewall","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/aws-network-firewall","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"qDwAvxwwJgRUyrZFMS43","title":"AWS Firewall Manager","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/aws-firewall-manager","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"wgt8eCxHFp6zvmswCeoo","title":"IAM Authentication Works with Databases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/iam-authentication-works-with-databases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"y4lUADPXL4rln2nsOQet","title":"AWS WAF (Web Application Firewall)","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/aws-waf-web-application-firewall","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"5OTp9Hfa82QOgF5RESNR","title":"Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"31kl6RI59Jv3qrx6dZ30","title":"AWS Endpoint Policy for Trusted S3 Buckets","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases/aws-endpoint-policy-for-trusted-s3-buckets","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"},{"label":"Use Cases"}]},{"id":"qiKjSIuYhVzlb4VKLZVY","title":"Increasing Fault Tolerance for AWS Direct Connect in SecureCart’s Multi-VPC Network","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases/increasing-fault-tolerance-for-aws-direct-connect-in-securecarts-multi-vpc-network","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"},{"label":"Use Cases"}]},{"id":"31aP5mqx219PPILhgnPI","title":"Securing Multi-Domain SSL with ALB in SecureCart Using SNI-Based SSL","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases/securing-multi-domain-ssl-with-alb-in-securecart-using-sni-based-ssl","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"},{"label":"Use Cases"}]},{"id":"p5MOUOeYSmANbVpaaPtK","title":"Configuring a Custom Domain Name for API Gateway with AWS Certificate Manager and Route 53","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases/configuring-a-custom-domain-name-for-api-gateway-with-aws-certificate-manager-and-route-53","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"},{"label":"Use Cases"}]},{"id":"ufbbcRDfQKIP54xyGdqa","title":"Application Load Balancer (ALB) – Redirecting HTTP to HTTPS","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases/application-load-balancer-alb-redirecting-http-to-https","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"},{"label":"Use Cases"}]},{"id":"VJyz85U5Dc26VKq6ohl5","title":"Security Considerations in ALB Logging & Monitoring","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/use-cases/security-considerations-in-alb-logging-and-monitoring","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"},{"label":"Use Cases"}]},{"id":"x2GQ0qfjcAnKa6xLdfoH","title":"Amazon CloudFront and Different Origin Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/amazon-cloudfront-and-different-origin-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"dJZzf7phXtwBhsbzC2aD","title":"Security Group","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/security-group","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"A5belERdigLWXLbl3UeX","title":"CloudFront","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/cloudfront","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"R7H57RUhmz2l1gGFxKB7","title":"NACL","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/nacl","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"CSYzU66mxoMvQYVdd9y6","title":"Amazon Cognito","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/amazon-cognito","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"Zahq53RsvOsCSH4mzTTR","title":"VPC Endpoint","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.2-design-secure-workloads-and-applications/vpc-endpoint","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.2: Design Secure Workloads and Applications"}]},{"id":"KI2lbyyJh5LgPErmXYTG","title":"Task Statement 1.3: Determine appropriate data security controls","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"}]},{"id":"cuTBMw8jDcvB6czob47p","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"SgrFjtDWFPqPHkRhSppX","title":"Data Access & Governance","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/data-access-and-governance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"IBVthHZ3czBxV0tOeO38","title":"Data Encryption & Key Management","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/data-encryption-and-key-management","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"orssbNLf5ygkPEfLlyAt","title":"Data Retention, Classification & Compliance","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/data-retention-classification-and-compliance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"3D4UyOKMCSPZzY4xfDQd","title":"Data Backup, Replication & Recovery","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/data-backup-replication-and-recovery","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"A1xqHi1HDCWaDE6hpUwY","title":"Managing Data Lifecycle & Protection Policies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/managing-data-lifecycle-and-protection-policies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"Wbvz4QxMp13p4eIiVMPN","title":"KMS","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/kms","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"JknS7sEaT8Z4mFGHo9Li","title":"S3 Security Measures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/s3-security-measures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"yyKHvHSmSEnpZl1cqa3x","title":"KMS Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/kms-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"KFHXixy8ZO7pRcndIJ90","title":"Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"e6CkVJvdqKWN71IoWcCh","title":"Safely Storing Sensitive Data on EBS and S3","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases/safely-storing-sensitive-data-on-ebs-and-s3","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"},{"label":"Use Cases"}]},{"id":"dCh12mSOX9vdelr4LMI7","title":"Managing Compliance & Security with AWS Config","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases/managing-compliance-and-security-with-aws-config","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"},{"label":"Use Cases"}]},{"id":"15GkOb239IyC7kJHaYS3","title":"Preventing Sensitive Data Exposure in Amazon S3","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases/preventing-sensitive-data-exposure-in-amazon-s3","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"},{"label":"Use Cases"}]},{"id":"nqCd4SLzgvYjAAc7YZhB","title":"Encrypting EBS Volumes for HIPAA Compliance","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases/encrypting-ebs-volumes-for-hipaa-compliance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"},{"label":"Use Cases"}]},{"id":"wyTe0ZVnV2c45xLu1sUd","title":"EBS Encryption Behavior","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases/ebs-encryption-behavior","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"},{"label":"Use Cases"}]},{"id":"SDkisUjGWGU7Tn9dAU1a","title":"Using EBS Volume While Snapshot is in Progress","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/use-cases/using-ebs-volume-while-snapshot-is-in-progress","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"},{"label":"Use Cases"}]},{"id":"J02rgcA6fds4bNIyHPuV","title":"Compliance","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/compliance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"JVcoWs9AC9RxTzC5xbFq","title":"Implementing Access Policies for Encryption Keys","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/implementing-access-policies-for-encryption-keys","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"nPfajPvwuAUvBVOElEVp","title":"Rotating Encryption Keys and Renewing Certificates","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/rotating-encryption-keys-and-renewing-certificates","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"17WneZPqyq9HduRlmiJ6","title":"Implementing Policies for Data Access, Lifecycle, and Protection","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/implementing-policies-for-data-access-lifecycle-and-protection","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"h7ztL6R2bFPwOoctdItD","title":"Rotating encryption keys and renewing certificates","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/rotating-encryption-keys-and-renewing-certificates-1","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"2KykeWKWCVx2SjQQLctb","title":"Instance Store","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/instance-store","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"YYDn9n8mQwBN0g22fJov","title":"AWS License Manager","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/aws-license-manager","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"oyfpUSMB7Kv1gF0AU0Bf","title":"Glacier","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/glacier","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"z1iDYyY7bcgpQQJTT0TT","title":"AWS CloudHSM Key Management & Zeroization Protection","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/aws-cloudhsm-key-management-and-zeroization-protection","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"ksiFB3zAFbEbvVc217Wp","title":"EBS","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/task-statement-1.3-determine-appropriate-data-security-controls/ebs","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Task Statement 1.3: Determine appropriate data security controls"}]},{"id":"PvI4QM3CQl1GXLyKWrlB","title":"AWS Security Services","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/aws-security-services","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"}]},{"id":"zmMoUE8xVKz7Zq4XngNG","title":"Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"}]},{"id":"9ZDNs6C5Cpd1pj9wkemQ","title":"IAM Policy & Directory Setup for S3 Access via Single Sign-On (SSO)","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/use-cases/iam-policy-and-directory-setup-for-s3-access-via-single-sign-on-sso","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Use Cases"}]},{"id":"afHuJIj7iPVVv3u0YJFF","title":"Federating AWS Access with Active Directory (AD FS) for Hybrid Cloud Access","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-1-design-secure-architectures/use-cases/federating-aws-access-with-active-directory-ad-fs-for-hybrid-cloud-access","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 1: Design Secure Architectures"},{"label":"Use Cases"}]},{"id":"tAvguRtv5qUw8Da3V80a","title":"Domain 2","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"}]},{"id":"kGVmtocH1c5QVaqQeYwk","title":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"}]},{"id":"AjSrOd2pwP1rEEw8g8xI","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"FtT2OQ7ATtZ99SaDkpab","title":"API Creation & Management","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/api-creation-and-management","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"RmeUGllyp00x9V0SPKCR","title":"Microservices & Event-Driven Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/microservices-and-event-driven-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"YmWacarve8Jjpr0NS53o","title":"Load Balancing & Scaling Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/load-balancing-and-scaling-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"JDGKTEfT3KKvw5PtHtje","title":"Caching Strategies & Edge Acceleration","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/caching-strategies-and-edge-acceleration","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"viHokbII7njgQ94Hk61P","title":"Serverless & Containerization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/serverless-and-containerization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"BZESJNdgdW9iObOpW7rH","title":"Workflow Orchestration & Multi-Tier Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.1-design-scalable-and-loosely-coupled-architectures/workflow-orchestration-and-multi-tier-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.1: Design Scalable and Loosely Coupled Architectures"}]},{"id":"DxwQV7RWv9W1PpZ3FwAs","title":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"}]},{"id":"wGxffbDyI3EyrsN8nfms","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"5GGND7Q0u8T6aT1cefmv","title":"AWS Global Infrastructure & Distributed Design","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/aws-global-infrastructure-and-distributed-design","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"sQZi03XX6DjWgmn530Ke","title":"Load Balancing & Failover Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/load-balancing-and-failover-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"afIY17aQG3bvQrMrnFz1","title":"Disaster Recovery (DR) Strategies & Business Continuity","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/disaster-recovery-dr-strategies-and-business-continuity","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"4Et1Q0e2KAZLTDwcmkYj","title":"Automation & Immutable Infrastructure","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/automation-and-immutable-infrastructure","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"zIeb3EQH7rawG500Iiym","title":"Monitoring & Workload Visibility","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/monitoring-and-workload-visibility","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"4G3kaOCs9oZW9F9A2MUc","title":"Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"}]},{"id":"aiM8T0PQRmPBnN3Ywrf0","title":"Amazon RDS Failover Events & Automatic Failover Mechanism","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-2/task-statement-2.2-design-highly-available-and-or-fault-tolerant-architectures/use-cases/amazon-rds-failover-events-and-automatic-failover-mechanism","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 2"},{"label":"Task Statement 2.2: Design highly available and/or fault-tolerant architectures"},{"label":"Use Cases"}]},{"id":"v9wkYmCUG1mjEUZLkdoZ","title":"Domain 3","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"}]},{"id":"ii5s8bJLKP6QYZkCQ2bn","title":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"}]},{"id":"LGILPcTm0IJeXAdMvS6V","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"51W5Fr0GrZ17WMJZa2f3","title":"Understanding AWS Storage Types & Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/understanding-aws-storage-types-and-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"Vsbli8T6paXNUYbP6OQi","title":"Storage Performance & Configuration Best Practices","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/storage-performance-and-configuration-best-practices","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"YSHpWVS8Sus70tSsIwdl","title":"Scalable & High-Performance Storage Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/scalable-and-high-performance-storage-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"JZ6gBy2wSbpoqNi2QCH6","title":"Hybrid & Multi-Cloud Storage Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/hybrid-and-multi-cloud-storage-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"wkxDnm462NOdg1JBvp6j","title":"Storage Optimization & Cost Efficiency","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/storage-optimization-and-cost-efficiency","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"tMsiOzZxuhYd8573kfSv","title":"Hands-on Labs & Final Challenge","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.1-determine-high-performing-and-or-scalable-storage-solutions/hands-on-labs-and-final-challenge","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.1: Determine high-performing and/or scalable storage solutions"}]},{"id":"EAnWB441RzoI5cL4ZG7Z","title":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"}]},{"id":"H3WlU7ryZg3WMAlDWfUN","title":"SecureCart","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions/securecart","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions"}]},{"id":"ioLcRhkDV8vRv1mRrsS9","title":"AWS Compute Services & Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions/aws-compute-services-and-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions"}]},{"id":"fuIG9ThDo7UZpo8dHlxS","title":"Elastic & Auto-Scaling Compute Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions/elastic-and-auto-scaling-compute-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions"}]},{"id":"eO5EGYWx2pJrl9O1zwuS","title":"Decoupling Workloads for Performance","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions/decoupling-workloads-for-performance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions"}]},{"id":"qjHr16EjN9zBH4wVk0dz","title":"Serverless & Containerized Compute Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions/serverless-and-containerized-compute-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions"}]},{"id":"Z5pkkV0CFahH7XmiBFVt","title":"Compute Optimization & Cost Efficiency","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.2-design-high-performing-and-elastic-compute-solutions/compute-optimization-and-cost-efficiency","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.2: Design High-Performing and Elastic Compute Solutions"}]},{"id":"M2xg8YvTFJ2YAbE7KQ24","title":"Task Statement 3.3: Determine High-Performing Database Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"}]},{"id":"s8G5fdjCJ1FZ1uWJYNVa","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.3: Determine High-Performing Database Solutions"}]},{"id":"z4hihBkKJicoCOIwWRsm","title":"AWS Database Types & Use Cases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions/aws-database-types-and-use-cases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.3: Determine High-Performing Database Solutions"}]},{"id":"xTpp0zl46XWOxdwaREZh","title":"Database Performance Optimization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions/database-performance-optimization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.3: Determine High-Performing Database Solutions"}]},{"id":"VPPlGUQvT9B1ex4OKKVG","title":"Caching Strategies for High-Performance Applications","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions/caching-strategies-for-high-performance-applications","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.3: Determine High-Performing Database Solutions"}]},{"id":"WG2vnSq8ZRjtLrkQeok4","title":"Database Scaling & Replication","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions/database-scaling-and-replication","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.3: Determine High-Performing Database Solutions"}]},{"id":"bwRcA3e4b4dHTuK9q1ce","title":"High Availability & Disaster Recovery for Databases","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.3-determine-high-performing-database-solutions/high-availability-and-disaster-recovery-for-databases","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.3: Determine High-Performing Database Solutions"}]},{"id":"Uu8qrGn9XLmOHhZ1i4dD","title":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"}]},{"id":"gY17mjp9ZVnEyRZ3tT5b","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"ybkm55Evfxz66FwkoD64","title":"AWS Networking Fundamentals & Edge Services","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/aws-networking-fundamentals-and-edge-services","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"TAYhHeVU3slE92fISQ8B","title":"Network Architecture & Routing Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/network-architecture-and-routing-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"ILJ4nODzw6mFasG2fA6m","title":"Load Balancing for Scalability & High Availability","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/load-balancing-for-scalability-and-high-availability","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"YXMJfpD686N2ID1N1w8v","title":"Hybrid & Private Network Connectivity","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/hybrid-and-private-network-connectivity","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"ksWZTCI0EwhO00fmNU4i","title":"Optimizing Network Performance","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/optimizing-network-performance","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"gwPhidJWn9PkPPB60x5w","title":"Site-to-Site VPN Integration for SAP HANA in AWS","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.4-determine-high-performing-and-or-scalable-network-architectures/site-to-site-vpn-integration-for-sap-hana-in-aws","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.4: Determine High-Performing and/or Scalable Network Architectures"}]},{"id":"6LafF1CynC7TA3OzZ1Cm","title":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"}]},{"id":"0TeC3COfdssRiFI4YV8n","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions"}]},{"id":"MTtA4qP0rrAdjwhRAjgz","title":"Data Ingestion Strategies & Patterns","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions/data-ingestion-strategies-and-patterns","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions"}]},{"id":"ADzgxIXa2BsI5TzVsJuR","title":"Data Transformation & ETL Pipelines","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions/data-transformation-and-etl-pipelines","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions"}]},{"id":"bg3WDxRr8gNW8ms6cY53","title":"Secure & Scalable Data Transfer","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions/secure-and-scalable-data-transfer","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions"}]},{"id":"P0Ijvc2BbGRCAgAaZCvd","title":"Building & Managing Data Lakes","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions/building-and-managing-data-lakes","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions"}]},{"id":"nJScfpih1cbZqe2m3esJ","title":"Data Visualization & Analytics","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-3/task-statement-3.5-determine-high-performing-data-ingestion-and-transformation-solutions/data-visualization-and-analytics","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 3"},{"label":"Task Statement 3.5: Determine High-Performing Data Ingestion and Transformation Solutions"}]},{"id":"8UhyF0uBq6GPrJomfBUu","title":"Domain 4","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"}]},{"id":"boaggr5UbaIvfs1xGwZu","title":"Task Statement 4.1: Design Cost-Optimized Storage Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"}]},{"id":"ZtsTqFAIWhIIG8Bf985l","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.1: Design Cost-Optimized Storage Solutions"}]},{"id":"wtjImvk6iAUNJ2UKMu3w","title":"AWS Storage Services & Cost Optimization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions/aws-storage-services-and-cost-optimization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.1: Design Cost-Optimized Storage Solutions"}]},{"id":"6Ipy461M2XhmuSgiLWN4","title":"Storage Tiering & Auto Scaling","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions/storage-tiering-and-auto-scaling","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.1: Design Cost-Optimized Storage Solutions"}]},{"id":"gseaJIccEzdgh9Xh8WrX","title":"Data Lifecycle Management & Archival Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions/data-lifecycle-management-and-archival-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.1: Design Cost-Optimized Storage Solutions"}]},{"id":"WIu0QIdAfY5LVwW2uXlX","title":"Hybrid Storage & Data Migration Cost Optimization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions/hybrid-storage-and-data-migration-cost-optimization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.1: Design Cost-Optimized Storage Solutions"}]},{"id":"w7jpXIi8mptnbrz4TvVz","title":"Cost-Optimized Backup & Disaster Recovery","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.1-design-cost-optimized-storage-solutions/cost-optimized-backup-and-disaster-recovery","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.1: Design Cost-Optimized Storage Solutions"}]},{"id":"ZwBntMB5s96CIBC2eDah","title":"Task Statement 4.2: Design Cost-Optimized Compute Solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"}]},{"id":"V7HVJQEJShQVAIMwTjSU","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"xWXKWNgpPN3YU84qG3im","title":"AWS Compute Options & Cost Management Tools","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/aws-compute-options-and-cost-management-tools","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"ki7lEEjcBdw8WDG0183H","title":"Compute Purchasing Models & Optimization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/compute-purchasing-models-and-optimization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"tCu6rISHJNZdIsFCfAj3","title":"Scaling Strategies for Cost Efficiency","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/scaling-strategies-for-cost-efficiency","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"ioVWfxZUkKbZpxX01GMP","title":"Serverless & Container-Based Cost Optimization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/serverless-and-container-based-cost-optimization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"Mm75oR5XSFwMLmCowpQv","title":"Hybrid & Edge Compute Cost Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/hybrid-and-edge-compute-cost-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"dTB8MKskeOrSeBvjIBRv","title":"AWS License Manager","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.2-design-cost-optimized-compute-solutions/aws-license-manager","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.2: Design Cost-Optimized Compute Solutions"}]},{"id":"0KTnF9znnsifUMtGsUCz","title":"Task Statement 4.3: Design cost-optimized database solutions","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"}]},{"id":"oLoP964rLEbxyJ85ijIl","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.3: Design cost-optimized database solutions"}]},{"id":"dxuRAyPxpLbElqOpvjhB","title":"AWS Database Services & Cost Optimization Tools","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions/aws-database-services-and-cost-optimization-tools","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.3: Design cost-optimized database solutions"}]},{"id":"aZZv6QxUsL28TWHEZbVo","title":"Database Sizing, Scaling & Capacity Planning","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions/database-sizing-scaling-and-capacity-planning","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.3: Design cost-optimized database solutions"}]},{"id":"RMCBLw5hNFUcNPXt3D6p","title":"Caching Strategies for Cost Efficiency","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions/caching-strategies-for-cost-efficiency","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.3: Design cost-optimized database solutions"}]},{"id":"Js5NjPg47XR325KVKbYB","title":"Backup, Retention & Disaster Recovery","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions/backup-retention-and-disaster-recovery","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.3: Design cost-optimized database solutions"}]},{"id":"dfVdARPt84kdibdXOxnw","title":"Cost-Optimized Database Migration Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.3-design-cost-optimized-database-solutions/cost-optimized-database-migration-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.3: Design cost-optimized database solutions"}]},{"id":"sw3vrQDl6ndm03jCQnby","title":"Task Statement 4.4: Design Cost-Optimized Network Architectures","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"}]},{"id":"70klXcnzYEH33C0y49Cw","title":"SecureCart Journey","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures/securecart-journey","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.4: Design Cost-Optimized Network Architectures"}]},{"id":"N6NGWZGsXcDIoSJ5GriL","title":"AWS Network Cost Management & Monitoring","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures/aws-network-cost-management-and-monitoring","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.4: Design Cost-Optimized Network Architectures"}]},{"id":"TbMenLJ1Gh0XyxQUJRYH","title":"Load Balancing & NAT Gateway Cost Optimization","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures/load-balancing-and-nat-gateway-cost-optimization","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.4: Design Cost-Optimized Network Architectures"}]},{"id":"5TbwukMtKsLnQbedPv4u","title":"Network Connectivity & Peering Strategies","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures/network-connectivity-and-peering-strategies","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.4: Design Cost-Optimized Network Architectures"}]},{"id":"Tt7ml3YRx8tbEUFW3r1Y","title":"Optimizing Data Transfer & Network Routing Costs","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures/optimizing-data-transfer-and-network-routing-costs","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.4: Design Cost-Optimized Network Architectures"}]},{"id":"BJfnD76fs7BmjYz64EYS","title":"Content Delivery Network & Edge Caching","pathname":"/study-group/aws-certified-solutions-architect-associate/domain-4/task-statement-4.4-design-cost-optimized-network-architectures/content-delivery-network-and-edge-caching","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Domain 4"},{"label":"Task Statement 4.4: Design Cost-Optimized Network Architectures"}]},{"id":"dhvKVwlonbGY885NWUDC","title":"Week Nine","pathname":"/study-group/aws-certified-solutions-architect-associate/week-nine","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"}]},{"id":"sJkudBToNhDepaij0Be3","title":"Final Review Session","pathname":"/study-group/aws-certified-solutions-architect-associate/week-nine/final-review-session","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Week Nine"}]},{"id":"CAFrWhGwhmPodAzukkq9","title":"Final Practice Test","pathname":"/study-group/aws-certified-solutions-architect-associate/week-nine/final-practice-test","siteSpaceId":"sitesp_qQOE7","breadcrumbs":[{"label":"Study Group"},{"label":"AWS Certified Solutions Architect - Associate"},{"label":"Week Nine"}]}]}