A developer is building a serverless application hosted on AWS that uses Amazon Redshift as a data store. The application has separate module for read/write and read-only functionality. The modules need their own database users for compliance reasons.
Which combination of steps should a security engineer implement to grant appropriate access? (Choose two.)
DayQuil
Highly Voted 3 years, 10 months agoDaniel76
3 years, 10 months agosamCarson
Most Recent 2 years, 2 months agocaptainpike
2 years, 1 month agopal40sg
2 years, 2 months agoITGURU51
2 years, 3 months agoawsguru1998
2 years, 5 months agoSergioP
2 years, 5 months agoboooliyooo
2 years, 7 months agovbal
2 years, 11 months agovbal
2 years, 11 months agosapien45
2 years, 11 months agodcasabona
3 years agoGeetar
3 years, 1 month agoTigerInTheCloud
3 years, 4 months agocaptainpike
2 years, 1 month agoMoreOps
3 years, 5 months agoSkr81
3 years, 5 months agocaptainpike
2 years, 1 month agoRadhaghosh
3 years, 6 months agoAWS_Dude
3 years, 6 months agoAWS_Dude
3 years, 6 months agos50600822
2 years, 1 month agoKaliKing
3 years, 7 months ago