Book Image

Mastering DynamoDB

By : Tanmay Deshpande
Book Image

Mastering DynamoDB

By: Tanmay Deshpande

Overview of this book

Table of Contents (18 chapters)
Mastering DynamoDB
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
8
Useful Libraries and Tools
Index

Summary


In this chapter, we started with understanding how to monitor DynamoDB tables; we saw various ways of the DynamoDB status and how to use it to get correct information about DynamoDB all the time. Then, we started with the AWS security model for DynamoDB. There, we talked about implementing security policies based on user roles and applying the same to the application. We went through a stepwise tutorial to create security groups, policies, and applying them on sample DynamoDB tables.

We also went through multiple example security policies, which would help to build a secure app in the near future. We also understood how to create fine-grained access control in real-time applications to maintain the integrity of the system. We also learned about one very interesting topic called web identity federation where we can use third-party websites to use the user identity and allow them to connect to DynamoDB after a successful token verification.

Finally, we listed down the best practices...