List of questions
Related questions
Question 353 - SCS-C01 discussion
You have just developed a new mobile application that handles analytics workloads on large scale datasets that are stored on Amazon Redshift. Consequently, the application needs to access Amazon Redshift tables. Which of the belov methods would be the best both practically and security-wise, to access the tables? Choose the correct answer from the options below Please select:
A.
Create an IAM user and generate encryption keys for that user. Create a policy for Redshift readonly access. Embed th keys in the application.
B.
Create an HSM client certificate in Redshift and authenticate using this certificate.
C.
Create a Redshift read-only access policy in IAM and embed those credentials in the application.
D.
Use roles that allow a web identity federated user to assume a role that allows access to the Redshift table by providing temporary credentials.
Your answer:
0 comments
Sorted by
Leave a comment first