Database Reference
In-Depth Information
Summary
In this chapter, we started with understanding how to monitor DynamoDB tables; we saw
various ways of the DynamoDB status and how to use it to get correct information about
DynamoDB all the time. Then, we started with the AWS security model for DynamoDB.
There, we talked about implementing security policies based on user roles and applying the
same to the application. We went through a stepwise tutorial to create security groups,
policies, and applying them on sample DynamoDB tables.
We also went through multiple example security policies, which would help to build a se-
cure app in the near future. We also understood how to create fine-grained access control in
real-time applications to maintain the integrity of the system. We also learned about one
very interesting topic called web identity federation where we can use third-party websites
to use the user identity and allow them to connect to DynamoDB after a successful token
verification.
Finally, we listed down the best practices of limitations and error handling in DynamoDB,
which one should keep handy in order to design a hiccup-free system.
In the next chapter, we will talk about how to integrate DynamoDB with other AWS com-
ponents in order to build the complete application ecosystem within cloud.
Search WWH ::




Custom Search