A security architect recommends replacing the company's monolithic software application with a containerized solution. Historically, secrets have been stored in the application's configuration files. Which of the following changes should the security architect make in the new system?
weaponxcel
8 months, 1 week ago32d799a
8 months, 2 weeks agoCXSSP
9 months, 2 weeks ago