A developer is building a serverless application hosted on AWS that uses Amazon Redshift as a data store. The application has separate module for read/write and read-only functionality. The modules need their own database users for compliance reasons.
Which combination of steps should a security engineer implement to grant appropriate access? (Choose two.)
DayQuil
Highly Voted 3 years, 9 months agoDaniel76
3 years, 8 months agosamCarson
Most Recent 2 years agocaptainpike
1 year, 11 months agopal40sg
2 years, 1 month agoITGURU51
2 years, 2 months agoawsguru1998
2 years, 3 months agoSergioP
2 years, 4 months agoboooliyooo
2 years, 5 months agovbal
2 years, 10 months agovbal
2 years, 9 months agosapien45
2 years, 10 months agodcasabona
2 years, 11 months agoGeetar
2 years, 11 months agoTigerInTheCloud
3 years, 2 months agocaptainpike
1 year, 11 months agoMoreOps
3 years, 3 months agoSkr81
3 years, 4 months agocaptainpike
1 year, 11 months agoRadhaghosh
3 years, 5 months agoAWS_Dude
3 years, 5 months agoAWS_Dude
3 years, 4 months agos50600822
1 year, 11 months agoKaliKing
3 years, 5 months ago