94%(31)29 out of 31 people found this document helpful
This preview shows page 8 - 12 out of 12 pages.
Step 3 – Commit the transaction and complete it if there are no errors.Step 4 – If an error occurs in the transaction, roll it back and end the operation
IAM Security Importance
Access LevelsCustomer – the bread and butter of our business. Levels should be consistent with just about every other company. Only what is needed to complete transactions and find company information.Administration – Access only to the customer facing applications and reports from transactions.Operations – Access to databases for IT and cross system functions.
Access Restrictions •Customer – Security should be handled client side and restricted to basic web access.•Administration – No access to customer databases only to tools for operations. •Operations – Read only on customer information and transactional database, Read write on RDS and access to servers for maintenance.
ReferencesAWS(2019). Retrieved from: Connolly, T. & Begg, C. (2015). Database systems: A practical approach to design, implementation andmanagement (6th ed.). Addison-Wesley, Pearson Higher Education.Elmarsi, R. & Navathe, S. B. (2016). Fundamentals of database systems (7th ed.). Addison-Wesley, Pearson Higher Education.Techopedia(2019). Retrieved from: Tech-FAQ(2019). Retrieved from: -database.html