A company uses an Amazon DynamoDB table to store data for an application. The application requires full access to the table. Some employees receive direct access to the table, but a security policy restricts their access to only certain fields. The company wants to begin using a DynamoDB Accelerator (DAX) cluster on top of the DynamoDB table.
How can the company ensure that the security policy is maintained after the implementation of the DAX cluster?
MultiAZ
1 year, 6 months agoDanShone
1 year, 10 months agoPranava_GCP
1 year, 10 months agoMonknil
1 year, 11 months agoWindy
1 year, 11 months agoKodoma
2 years, 1 month agoaviathor
2 years, 1 month agocnmc
2 years, 1 month agordiaz
2 years, 3 months ago