Your organization relies on encryption keys to safeguard user data confidentiality within the Cloud Key Management Service (Cloud KMS). To mitigate the impact of a potential compromise of a symmetric encryption key, what steps should your security team take proactively? Select two options from the following: