Examtopics

AWS Certified Security - Specialty
  • Topic 1 Question 280

    A company runs a custom online gaming application. The company uses Amazon Cognito for user authentication and authorization.

    A security engineer wants to use AWS to implement fine-grained authorization on resources in the custom application. The security engineer must implement a solution that uses the user attributes that exist in Cognito. The company has already set up a user pool and an identity pool in Cognito.

    Which solution will meet these requirements?

    • Create a set of IAM roles and IAM policies. Configure the Cognito identity pool to assign users to the IAM roles.

    • Create a policy store in Amazon Verified Permissions. Configure Cognito as the identity source. Map Cognito access tokens to the Verified Permissions schema.

    • Create customer managed permissions by using AWS Resource Access Manager (AWS RAM). Configure the Cognito identity pool to assign users to the customer managed permissions.

    • Create a set of IAM users and IAM policies. Configure the Cognito user pool to assign users to the IAM users.


    シャッフルモード