A company leverages AWS CloudFormation to build their infrastructure on AWS. The security department is concerned about sensitive data being exposed. A DevOps engineer has been asked to implement steps to prevent the exposure of sensitive parameters such as passwords during infrastructure deployment operations. Which combination of steps should be taken to improve security when deploying infrastructure using AWS CloudFormation? (Select TWO.)