A user has created a mobile application which makes calls to DynamoDB to fetch certain data. The application is using the DynamoDB SDK and root account access/secret access key to connect to DynamoDB from mobile. Which of the below mentioned statements is true with respect to the best practice for security in this scenario?
dexdinh91
4 months, 4 weeks agoalbert_kuo
10 months, 4 weeks agoxxxdolorxxx
2 years, 5 months agoTroyMcLure
2 years, 6 months agoawscertified
2 years, 6 months ago