O'Reilly logo

Mastering DynamoDB by Tanmay Deshpande

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we started with understanding how to monitor DynamoDB tables; we saw various ways of the DynamoDB status and how to use it to get correct information about DynamoDB all the time. Then, we started with the AWS security model for DynamoDB. There, we talked about implementing security policies based on user roles and applying the same to the application. We went through a stepwise tutorial to create security groups, policies, and applying them on sample DynamoDB tables.

We also went through multiple example security policies, which would help to build a secure app in the near future. We also understood how to create fine-grained access control in real-time applications to maintain the integrity of the system. We also learned ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required