Which practice is not recommended for secure encryption key management?
Use a centralized key management system.
Use a strong encryption algorithm.
Rotate encryption keys regularly.
Store keys in unencrypted text files.

Cloud Security Exercises are loading ...