Watch this video on YouTube
When considering the security of credentials for a platform, which type of deployment is more secure?