5. You have just developed a new mobile application that handles analytics workloads on large scale datasets that are stored on Amazon Redshift. Consequently, the application needs to access Amazon Redshift tables. Which of the below methods would be the best, both practically and security-wise, to access the tables? Choose the correct answer from the options below
A) Use roles that allow a web identity federated user to assume a role that allows access to the RedShift table by providing temporary credentials. B) Create an HSM client certificate in Redshift and authenticate using this certificate. C) Create a RedShift read-only access policy in IAM and embed those credentials in the application. D) Create an IAM user and generate encryption keys for that user. Create a policy for RedShift read-only access. Embed the keys in the application.
5. Right Answer: A Explanation: The AWS(Amazon Web Service) Documentation mentions the following Option A,B and C are all automatically incorrect because you need to use IAM Roles for Secure access to services For more information on web identity federation please refer to the below link http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html
Leave a comment