A user has created a mobile application which makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK and root account access/secret access key to connect to DynamoDB from mobile. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?
dexdinh91
5 months agoalbert_kuo
11 months agoxxxdolorxxx
2 years, 6 months agoTroyMcLure
2 years, 6 months agoawscertified
2 years, 6 months ago