This is a dedicated watch page for a single video.
You have been assigned to secure a Cloud SQL database for your organization. To meet compliance requirements, you need to control and audit the encryption keys used to protect sensitive data stored in Cloud SQL. Which approach best meets these requirements?