Your application artifacts are currently being built and deployed through a CI/CD pipeline. To ensure that this pipeline can securely access application secrets, and to facilitate easier rotation of these secrets in the event of a security breach, what should you do?