A developer is building a serverless application hosted on AWS that uses Amazon Redshift as a data store. The application has separate module for read/write and read-only functionality. The modules need their own database users for compliance reasons.
Which combination of steps should a security engineer implement to grant appropriate access? (Choose two.)
DayQuil
Highly Voted 3 years, 7 months agoDaniel76
3 years, 6 months agosamCarson
Most Recent 1 year, 10 months agocaptainpike
1 year, 9 months agopal40sg
1 year, 11 months agoITGURU51
2 years agoawsguru1998
2 years, 1 month agoSergioP
2 years, 2 months agoboooliyooo
2 years, 3 months agovbal
2 years, 7 months agovbal
2 years, 7 months agosapien45
2 years, 8 months agodcasabona
2 years, 8 months agoGeetar
2 years, 9 months agoTigerInTheCloud
3 years agocaptainpike
1 year, 9 months agoMoreOps
3 years, 1 month agoSkr81
3 years, 1 month agocaptainpike
1 year, 9 months agoRadhaghosh
3 years, 2 months agoAWS_Dude
3 years, 3 months agoAWS_Dude
3 years, 2 months agos50600822
1 year, 9 months agoKaliKing
3 years, 3 months ago