How I renewed the AWS Certified Security Specialty (SCS-C03)
Iâm writing this post after passing the AWS Certified Security Specialty (SCS-C03). I wanted to document what I did to prepare and why, in my opinion, itâs one of the most useful AWS certifications.
I had already passed a previous version (SCS-C01) more than three years ago. Even though it had expired, you can still consider this a renewal. In practice, it doesnât really matter: itâs the same exam, and the real goal is to get up to speed with the current exam content.
When I prepared it the first time, I wrote several AWS security posts, and for this renewal they were a great foundation and a great refresher. Some of them will be updated soon. Iâm linking them here in case you want to go deeper on specific topics.
Foundations and approach:
- Getting Started with AWS Security
- How to Improve Your AWS Account Security
- Multi-Account Approach on AWS
- AWS Control Tower: Deep Dive
Services (deep dives):
Open source for security reviews:
- AWS Open Source Tools for Security Assessments (Environment)
- Static Analysis of IaC on AWS (Checkov, KICS, etc.)
And if youâre interested in the method I follow to study for an AWS certification, I wrote about it here:
Why this certification is worth it
For me, this is the second most important certification after Architect Professional.
Not because it magically âmakes you more secure,â but because it forces you to review security best practices that youâll apply in any architecture: identity, permissions, encryption, traceability, detection, and response. Once you internalize those, you design better, operate better, and make fewer mistakes.
In security, failures are often small details. This certification trains you on those details.
The exam in 2 minutes
The basics:
- Duration: 170 minutes
- Questions: 65
- Type: multiple choice and multiple response (long, scenario-heavy questions)
- Price: 300 USD
- Validity: 3 years
Official page:
About scoring:
- The score ranges from 100 to 1000, and the passing score is 750.
- AWS includes 15 unscored questions (theyâre not identified as such).
Take the time seriously. This isnât an exam you can rush. The questions are long and sometimes complex.
SCS-C03: the new version of the exam
When I saw the new SCS-C03 version, what worried me the most was the inclusion of AI and GenAI topics. Not because it doesnât make sense (it was inevitable), but because this part was new to me.
The official exam guide lists these services in scope:
- Amazon Bedrock
- Amazon Q (Business and Developer)
- SageMaker AI
- CodeGuru Security
I treated it as âsecurity for AI services,â mainly from the angle of:
- permissions and access control (IAM)
- data protection and data access
- traceability and auditing (what gets logged and where)
And now the key data point, in case youâre renewing and feeling the same way I did:
in my exam I only got 1 AI-related question, and it was about permissions in Amazon Q Developer. Nothing else. The rest of the exam felt very similar to previous versions.
My takeaway: donât ignore AI, but donât obsess over it either. IAM is still the headline, and it shows up everywhere.
Domain changes
Structurally, SCS-C03 clearly separates Detection and Incident Response (they were more mixed before). And the old âSecurity Logging and Monitoringâ domain no longer appears as a standalone block: itâs now integrated into Detection and connected to response.
Official domain weights (as shown in the Exam Guide):
| Domain | Weight |
|---|---|
| Detection | 16% |
| Incident Response | 14% |
| Infrastructure Security | 18% |
| Identity and Access Management | 20% |
| Data Protection | 18% |
| Security Foundations and Governance | 14% |
How I prepared
My preparation was very direct and very hands-on, but it wasnât only the console.
What I did:
- Used the AWS Console to refresh key services and options (my favorite part, because it helps me ground the theory)
- A Udemy course (I only reviewed the PDF/course summary)
- I didnât do practice exam questions. This isnât the usual approach and I wouldnât recommend it in general, but in my case I knew the material well and relied on real experience.
It worked for me, but be careful about copying this strategy without context: what makes the difference here is practice and experience, because the questions are scenario-based and full of nuances.
My review path (and why this order)
This was the order I followed:
- Foundations and Governance
- IAM
- Data Protection
- Detection
- Incident Response
- Infrastructure Security
Why:
- I started with the basics: the Security Pillar of the AWS Well-Architected Framework.
- IAM was the star of the exam, without a doubt. Itâs the area with the most nuances, and where itâs easiest to fail because of a small detail.
- Data Protection is tightly linked to IAM (KMS, S3, Secrets) and also has plenty of traps.
- I reviewed Detection and Incident Response back-to-back, because mentally theyâre connected: you detect and understand first, then you respond. This is where most AWS security services show up.
- I left Infrastructure Security for the end as a more general review.
What I reviewed in the AWS Console (my checklist)
This is not a step-by-step guide. Itâs my âopen the service and review the key partsâ list that helped me refresh.
Foundations and Governance
- The Security Pillar in the AWS Well-Architected Framework
- Organizations: governance at scale
- Artifact/Audit Manager: audits and evidence
IAM
- Policies: common conditions, explicit denies, evaluation order
- Roles: trust policies, cross-account, AssumeRole patterns
- IAM Access Analyzer: unintended exposures caused by policies
- IAM Identity Center: permission sets and account assignments
Data Protection
- KMS: key policy vs IAM policy, grants, rotation, usage vs admin permissions
- Secrets Manager: rotation, resource policy, read permissions
- S3: Block Public Access, bucket policy, conditions (TLS, org, endpoints), SSE-S3 vs SSE-KMS
Detection
- CloudTrail and CloudTrail Lake: critical events and traceability
- AWS Config: rules, conformance packs, drift
- Security Hub: centralize security findings (standards, controls, findings)
- GuardDuty: threat detection from signals like CloudTrail, VPC Flow Logs, and DNS logs
- Inspector: automated assessments (for example, EC2, ECR, and Lambda)
- Detective: investigation and correlation based on signals
- Macie: sensitive data findings
- Security Lake: concept, OCSF, and how it fits into detection
Incident Response
- Systems Manager: Session Manager and Run Command as containment tools
- Detective: investigation and signal pivoting
- EventBridge/SNS: basic response automation patterns
Infrastructure Security
- VPC endpoints: private connectivity to services
- Security Groups and NACLs: differences and typical use cases
- Network Firewall: where it fits and what it solves
- WAF: managed rules, rate-based, logging
- Shield: when it makes sense
Conclusions
If youâre renewing, my summary would be:
- IAM is the priority. Itâs the area where itâs easiest to make mistakes due to nuances, and where youâll see the most questions.
- The console is an excellent way to refresh quickly, and it helps complement real experience and ground concepts.
- In my case, the âAI fearâ was bigger than the exam reality: I only got 1 question, and it was about permissions in Amazon Q Developer.
If youâre starting from zero, I recommend adding a course and practice questions. And if youâre renewing with experience, a focused and intense console review session can give you a lot of speed.
If I had to pick just one security resource to review, it would be the Security Pillar of the AWS Well-Architected Framework (not for the exam, but for general knowledge).
