Amazon Web Services AWS Certified Security - Specialty SCS-C02 Question # 31 Topic 4 Discussion

Amazon Web Services AWS Certified Security - Specialty SCS-C02 Question # 31 Topic 4 Discussion

SCS-C02 Exam Topic 4 Question 31 Discussion:
Question #: 31
Topic #: 4

A developer 15 building a serverless application hosted on IAM that uses Amazon Redshift in a data store. The application has separate modules for read/write and read-only functionality. The modules need their own database users tor compliance reasons.

Which combination of steps should a security engineer implement to grant appropriate access' (Select TWO )


A.

Configure cluster security groups for each application module to control access to database users that are required for read-only and read/write.


B.

Configure a VPC endpoint for Amazon Redshift Configure an endpoint policy that maps database users to each application module, and allow access to the tables that are required for read-only and read/write


C.

Configure an IAM poky for each module Specify the ARN of an Amazon Redshift database user that allows the GetClusterCredentials API call


D.

Create focal database users for each module


E.

Configure an IAM policy for each module Specify the ARN of an IAM user that allows the GetClusterCredentials API call


Get Premium SCS-C02 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.