All technological notes.
AWS Certificate Manager (ACM)Usage
TLS Certificatesin-flight encryption for websites (HTTPS)features
Integrations with (load TLS certificates on)
Elastic Load Balancers (CLB, ALB, NLB)CloudFront DistributionsAPI GatewayCannot use ACM with EC2 (can’t be extracted)

Fully Qualified Domain Name (FQDN):
corp.example.comWildcard Domain:
*.example.comDNS Validation or Email validation
DNS Validation is preferred for automation purposes
CNAME record to DNS config(ex: Route 53)Email validation will send emails to contact addresses in the WHOIS databasePublic Certificate will be enrolled for automatic renewal
EventBridgeAWS Config has a managed rule named cm-certificate-expiration-check to check for expiring certificates (configurable number of days)
HTTP request to a HTTPS request.
Based on different Endpoint Types
Create a Custom Domain Name in API Gateway
Edge-Optimized (default):
TLS Certificate must be in the same region as CloudFront, i.e.: us-east-1
Regional:

Private:
Sample:
Edge-Optimized API Gateway in us-west-2 AWS region. This main Edge-Optimized API Gateway forwards traffic to the second level API Gateway in ap-southeast-1. You want to secure the main API Gateway by attaching an ACM certificate to it. Which AWS region are you going to create the ACM certificate in?
Edge-Optimized API Gateway is using a custom AWS managed CloudFront distribution behind the scene to route requests across the globe through CloudFront Edge locations, the ACM certificate must be created in us-east-1.