To ensure secure access to application secrets and facilitate their rotation in case of a security breach, leveraging a CI/CD pipeline for building and deploying application artifacts is recommended. What is the optimal method to achieve this? | Google Professional Cloud DevOps Engineer Quiz - LeetQuiz