Ultimate access to all questions.
You have configured a system where streaming data is inserted into a Redis cluster through a Kafka cluster. Both Redis and Kafka clusters are hosted on Compute Engine instances. Your objective is to ensure that the data at rest is encrypted. Furthermore, you require the capability to create, rotate, and destroy encryption keys as necessary. What steps should you take to achieve this?