Secrets Management (Security)
Back: Infrastructure Security
Securely storing, distributing, and rotating credentials, API keys, certificates, and other sensitive configuration. Secrets should never be hardcoded, should be rotated regularly, and should follow the principle of least privilege.