How can the company ensure that the security policy is maintained after the implementation of the DAX cluster?
A company uses an Amazon DynamoDB table to store data for an application.The application requires full access to the table.Some employees receive direct access to the table, but a security policy restricts their access to only certain fields.The company wants to begin using a DynamoDB Accelerator (DAX) cluster on top of the DynamoDB table.How can the company ensure that the security policy is maintained after the implementation of the DAX cluster?Read More →