Ultimate access to all questions.
Your organization is planning to enhance its cybersecurity posture by implementing a robust solution for managing secrets, keys, and certificates across its Azure environment. The solution must comply with industry standards, ensure high availability, and support automated rotation and expiration policies. Additionally, the organization aims to minimize operational overhead and avoid practices that could introduce security vulnerabilities. Considering these requirements, which of the following practices should be strictly avoided when designing this solution? (Choose one option)