A gaming organization is developing a new game and would like to offer real-time competition to their users. The data architecture has the following characteristics:
✑ The game application is writing events directly to Amazon DynamoDB from the user's mobile device.
✑ Users from the website can access their statistics directly from DynamoDB.
✑ The game servers are accessing DynamoDB to update the user's information.
✑ The data science team extracts data from DynamoDB for various applications.
The engineering team has already agreed to the IAM roles and policies to use for the data science team and the application.
Which actions will provide the MOST security, while maintaining the necessary access to the website and game application? (Choose two.)
Bulti
Highly Voted 3 years, 7 months agocertish
3 years, 7 months agomatthew95
3 years, 7 months agovicks316
3 years, 7 months agoDerekKey
3 years, 7 months agomattyb123
Highly Voted 3 years, 8 months agohailiang
Most Recent 3 years, 7 months agoDerekKey
3 years, 7 months agoaskaron
3 years, 7 months agoalopazo
3 years, 7 months agopiemar
3 years, 7 months agosan2020
3 years, 8 months agoAdamSmith
3 years, 8 months agoME2000
3 years, 8 months agoBigEv
3 years, 8 months agochaudh
3 years, 8 months agohailiang
3 years, 8 months agobigdatalearner
3 years, 8 months agod00ku
3 years, 8 months agos3an
3 years, 8 months agoranabhay
3 years, 8 months agomattyb123
3 years, 8 months agojlpl
3 years, 8 months agocybe001
3 years, 8 months agos3an
3 years, 8 months ago