How should we think about IAM roles for deployment actions?
Is encrypting our secrets enough?
Encrypting our secrets is only a small part of the story.