A user has created a mobile application which makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK and root account access/secret access key to connect to DynamoDB from mobile. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?
dexdinh91
7 months agoalbert_kuo
1 year agoxxxdolorxxx
2 years, 7 months agoTroyMcLure
2 years, 8 months agoawscertified
2 years, 8 months ago