I believe the keys are leaked in the deployment log which sets off security events in my internal sub. Typically the way infra deals with keys is to put them in Key Vault so they don't leak through deployment logs. Once they are in key vault, they can be handed to ACA without a leak.
I believe the keys are leaked in the deployment log which sets off security events in my internal sub. Typically the way infra deals with keys is to put them in Key Vault so they don't leak through deployment logs. Once they are in key vault, they can be handed to ACA without a leak.