AWS Certified Security Specialty
275 practice questions
Last reviewed: April 2026
Personal notes and resource links for your study journey
Filter by Certification
The AWS Certified Security Specialty (SCS-C03) is the senior-tier security-focused credential and one of the most respected cloud security certifications. It validates the ability to design and operate secure AWS workloads β including identity, data protection, infrastructure security, threat detection, incident response, and governance. The exam targets cloud security engineers, cloud security architects, and DevSecOps engineers with multi-year AWS and security experience. Expect long, scenario-heavy questions that combine IAM, KMS, networking, and detection services and ask for the BEST security answer under realistic constraints. SCS-C03 launched in July 2023, refreshing SCS-C01 with broader detection, GenAI-adjacent governance, and modernized data-protection coverage. The exam is conceptual; no hands-on labs.
Logging architecture (CloudTrail organization trails, VPC Flow Logs, DNS query logs, S3 access logs), centralized logging with Security Hub aggregation, and Athena queries over CloudTrail. Common stumbling block: distinguishing CloudTrail Lake from Athena-on-CloudTrail tradeoffs.
Containment patterns (isolating compromised EC2/ECS workloads, rotating credentials, quarantining S3 buckets), forensic-evidence preservation, and runbooks with SSM. Often missed: the precise sequence for IAM credential compromise.
VPC security (security groups, NACLs, endpoints, PrivateLink), AWS WAF and Shield, Network Firewall, and edge protection. Heavy emphasis on defense-in-depth layering.
The largest domain at 20%. Permission boundaries, SCPs, condition keys (especially aws:PrincipalOrgID, aws:SourceVpce, aws:CalledVia), STS, Identity Center, and resource-based policies. The single highest-density area on the exam.
KMS (key policies, grants, multi-region keys, BYOK), encryption in transit (ACM, certificate management), Macie, and S3 protection patterns. Nuanced KMS key-policy evaluation is a frequent stumbling block.
Multi-account governance with Organizations, Control Tower, Config conformance packs, and Audit Manager. Smaller weight but tests strategic security thinking.
$140kβ$200kβ$290k USD annual
Range covers US-based mid-to-senior cloud security roles where AWS proficiency is required. Top-tier financial services, FAANG, and security-focused unicorns frequently exceed $350k TC. Entry "security engineer" titles in non-coastal markets fall below the low end. Security specialty certs reliably command a premium relative to general cloud certs.
Source: levels.fyi 2025β2026 cloud security roles, U.S. BLS OEWS May 2024 (15-1212 information security analysts). Figures are approximate; actual compensation depends on role, region, and experience.
Cloud security hiring remained strong through 2024β2026 as enterprises continued maturing security programs around multi-account AWS estates, zero-trust patterns, and supply-chain risk. SCS-C03 is widely listed as preferred for cloud security engineer and architect roles, and is one of the more universally respected single security credentials alongside CISSP and CCSP. Recruiters at financial services, healthcare, and security-focused SaaS treat it as a credible signal of AWS-specific security depth. It pairs naturally with SAA-C03 or SAP-C02, the Advanced Networking Specialty (ANS-C01), and cross-vendor credentials. The cert does NOT by itself qualify candidates for CISO or VP-security roles β those expect broader program leadership and risk-management experience.
There are no formal prerequisites. AWS recommends at least 3β5 years of general IT security experience and at least 2 years of hands-on AWS security experience.
Most candidates approach SCS-C03 after SAA-C03 (architectural foundation) and ideally after SAP-C02 or DOP-C02 for additional depth. Candidates with strong general security backgrounds (CISSP, CompTIA Security+) but limited AWS exposure should plan substantial extra time on IAM (especially permission boundaries and SCPs), KMS key policies, and the AWS detection-services taxonomy. A working multi-account AWS Organizations lab with Control Tower, Config conformance packs, and centralized logging is the highest-ROI preparation artifact.
SCS-C03 is rated Specialty and is one of the harder AWS exams. Plan 80β140 hours over 10β14 weeks for candidates already working in cloud security; 160β220+ hours for those coming from general security or general AWS backgrounds. The exam is 65 scored questions in 170 minutes β multiple-choice and multiple-response, no labs.
The single biggest stumbling block is IAM policy evaluation depth: understanding precisely how identity policies, resource policies, permission boundaries, SCPs, and session policies combine, and how condition keys interact with cross-account access. KMS key-policy evaluation runs a close second. Candidates also routinely lose points on detection-service differentiation (GuardDuty vs. Security Hub vs. Detective vs. Inspector) and on subtle VPC traffic-flow questions involving endpoints and PrivateLink.
Current version. Modernized coverage of detection services, multi-account governance, KMS multi-region keys, and Network Firewall. Updated incident-response patterns reflecting EventBridge / SSM Automation maturity.
Brief intermediate revision. Retired in 2023.
Original Security Specialty. Long retired; pre-Security-Hub-era detection tooling.
SCS-C03 (AWS Certified Security Specialty) is a a deeply specialized exam covering advanced topics in a narrow domain β expect hands-on experience to be a prerequisite Specialty-level exam. Most candidates need 100β200 hours of study spread over 2β4 months for specialty exams. These assume hands-on experience in the specialty domain. Most candidates who score consistently above the passing threshold on practice exams pass on their first attempt.