ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 353 - SCS-C01 discussion

Report
Export


You have just developed a new mobile application that handles analytics workloads on large scale datasets that are stored on Amazon Redshift. Consequently, the application needs to access Amazon Redshift tables. Which of the belov methods would be the best both practically and security-wise, to access the tables? Choose the correct answer from the options below Please select:

A.
Create an IAM user and generate encryption keys for that user. Create a policy for Redshift readonly access. Embed th keys in the application.
Answers
A.
Create an IAM user and generate encryption keys for that user. Create a policy for Redshift readonly access. Embed th keys in the application.
B.
Create an HSM client certificate in Redshift and authenticate using this certificate.
Answers
B.
Create an HSM client certificate in Redshift and authenticate using this certificate.
C.
Create a Redshift read-only access policy in IAM and embed those credentials in the application.
Answers
C.
Create a Redshift read-only access policy in IAM and embed those credentials in the application.
D.
Use roles that allow a web identity federated user to assume a role that allows access to the Redshift table by providing temporary credentials.
Answers
D.
Use roles that allow a web identity federated user to assume a role that allows access to the Redshift table by providing temporary credentials.
Suggested answer: D

Explanation:

The AWS Documentation mentions the following

"When you write such an app, you'll make requests to AWS services that must be signed with an AWS access key. However, we strongly recommend that you do not embed or distribute long-term AWS credentials with apps that a user downloads t device, even in an encrypted store. Instead, build your app so that it requests temporary AWS security credentials dynamica when needed using web identify federation. The supplied temporary credentials map to an AWS role that has only the permissioi needed to perform the tasks required by the mobile app".

Option A.B and C are all automatically incorrect because you need to use IAM Roles for Secure access to services For more information on web identity federation please refer to the below Link: http://docs.aws.amazon.com/IAM/latest/ UserGuide/id_roles_providers_oidc.html The correct answer is: Use roles that allow a web identity federated user to assume a role that allows access to the RedShift table by providing temporary credentials. Submit your Feedback/Queries to our Experts

asked 16/09/2024
Rey Geric Villafranca
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first