| Detail | Info |
|---|---|
| Exam Code | SCS-C03 (current — C02 retired Dec 1 2025) |
| Questions | 65 total (50 scored + 15 unscored) |
| Duration | 170 minutes |
| Passing Score | 750 / 1000 (scaled) |
| Question Types | Multiple choice, multiple select, scenario-based |
| Experience | 3–5 years designing AWS security solutions |
| Domain | Weight | ~Questions |
|---|---|---|
| 1. Detection | 16% | ~8 |
| 2. Incident Response | 14% | ~7 |
| 3. Infrastructure Security | 18% | ~9 |
| 4. Identity & Access Management | 20% | ~10 |
| 5. Data Protection | 18% | ~9 |
| 6. Security Foundations & Governance | 14% | ~7 |
Core Services
GuardDuty · CloudTrail · CloudWatch · Security Hub · Detective · VPC Flow Logs
CloudTrail
GuardDuty
Security Hub
Amazon Detective
CloudWatch Alarms
Common Question Patterns
Core Services
Systems Manager · EventBridge · Lambda · Step Functions · EC2
Compromised EC2 — Memorize This Flow
Compromised IAM Credentials — Memorize This Flow
aws:TokenIssueTime condition (revokes active sessions)Automated IR Pattern
Forensics Best Practices
Security Groups vs. NACLs
| Feature | Security Groups | NACLs |
|---|---|---|
| Level | ENI (instance) | Subnet |
| State | Stateful | Stateless |
| Rules | Allow only | Allow AND Deny |
| Evaluation | All rules evaluated | Lowest number first |
| Default | Deny all inbound | Allow all |
VPC Endpoints
| Type | Services | Cost | Mechanism |
|---|---|---|---|
| Gateway | S3 + DynamoDB only | Free | Route table entry |
| Interface (PrivateLink) | All other AWS services | $/hr + data | ENI in subnet |
aws:SourceVpce condition
WAF Attachment Points
Shield Standard vs. Advanced
| Feature | Standard | Advanced |
|---|---|---|
| Cost | Free | $3,000/month |
| Protection | L3/L4 auto | L3/L4/L7 + SRT |
| DDoS cost protection | No | Yes |
| WAF included | No | Yes (for L7) |
Session Manager (No SSH!)
IMDSv2 vs. IMDSv1
HttpTokens=requiredCommon Question Patterns
Policy Evaluation Logic — MEMORIZE THIS
Policy Types Reference
| Type | Attached To | Can Grant | Can Deny |
|---|---|---|---|
| Identity policy | User/Group/Role | Yes | Yes |
| Resource policy | S3, KMS, SQS… | Yes | Yes |
| SCP | OU/Account | No | Yes |
| Permission Boundary | User/Role | No | Yes |
| Session Policy | STS Session | No | Yes |
ABAC vs. RBAC
aws:ResourceTag/Project == aws:PrincipalTag/ProjectCognito
| Pool Type | Purpose | Returns |
|---|---|---|
| User Pool | Authentication (sign in) | JWT tokens |
| Identity Pool | Authorization | AWS credentials (via STS) |
Flow: User → IdP → Cognito User Pool (JWT) → Identity Pool → STS → AWS credentials
IAM Access Analyzer
IAM Identity Center (SSO)
Common Question Patterns
Envelope Encryption — MEMORIZE THIS
KMS Key Types
| Type | Cost | Rotation | Control |
|---|---|---|---|
| AWS-managed | Free | Auto (1yr) | None |
| Customer-managed CMK | $1/month | Manual or auto | Full |
| AWS-owned | Free | AWS manages | Not visible |
kms:ViaService: restrict key use to specific AWS services onlyKMS vs. CloudHSM
| Feature | KMS | CloudHSM |
|---|---|---|
| FIPS level | 140-2 Level 2 | 140-2 Level 3 |
| Tenancy | Multi-tenant | Single-tenant dedicated |
| Management | AWS | You |
| Use case | Most workloads | Strict compliance, custom crypto |
S3 Encryption Options
| Type | Key Managed By | CloudTrail | Extra Cost |
|---|---|---|---|
| SSE-S3 | AWS (AES-256) | No | No |
| SSE-KMS | KMS CMK | Yes | KMS API calls |
| SSE-C | Customer (per request) | No | No |
| CSE | Customer (client-side) | No | No |
s3:x-amz-server-side-encryption header is absentSecrets Manager vs. Parameter Store
| Feature | Secrets Manager | Parameter Store |
|---|---|---|
| Cost | ~$0.40/secret/mo | Free (standard) |
| Auto-rotation | Yes, native | No (custom only) |
| Use case | DB passwords, API keys | Config + basic secrets |
ACM Certificates
Common Question Patterns
SCP Rules — MEMORIZE
FullAWSAccess must be explicitly attached — not default
Control Tower Guardrail Types
| Type | Implementation | Effect |
|---|---|---|
| Preventive | SCP | Blocks the action |
| Detective | Config rule | Alerts on violation |
| Proactive | CloudFormation hooks | Checks before creation |
Multi-Account Architecture
Compliance Services
| Service | Use Case |
|---|---|
| AWS Config | Continuous config drift detection, remediation |
| Audit Manager | Auto-collect evidence for compliance frameworks (HIPAA, SOC2, PCI) |
| AWS Artifact | Download AWS compliance reports (SOC, ISO, PCI) for auditors |
| Security Hub | Aggregate findings + run CIS/PCI-DSS/NIST compliance checks |
| Macie | S3 sensitive data classification (PII detection) — NOT threat detection |
NEW: GenAI Security (SCS-C03 Only)
Common Question Patterns
| The Trap | The Real Answer |
|---|---|
| MFA on root account | Hardware MFA — virtual MFA not enough for exam scenarios |
| SCP allows Admin but user blocked | Check permission boundary or session policy |
| KMS key deleted, data gone? | 7–30 day deletion window — cancel if within window |
| CloudTrail not logging S3 object access | Data events must be explicitly enabled |
| New account, GuardDuty not detecting | Must be enabled per region OR use Organizations auto-enable |
| Access Analyzer shows no findings | Resource IS private — only shows external access |
| Shield Advanced SRT can help | Only if pre-authorized AND subscribed to Advanced |
| ACM cert on EC2 directly | Not supported — ACM public certs for integrated services only |
| Deny in SCP for management account | SCPs do NOT apply to management account |
| AdministratorAccess + permission boundary | Boundary is the effective limit — Admin is capped |
| First step when key exposed in GitHub | DISABLE the key (not rotate — old key still works until disabled) |
| Revoke active IAM role sessions | Attach deny policy with aws:TokenIssueTime condition |
Choose a game mode and test your knowledge. Beat your high score.