Your organization is developing serverless applications with Oracle Functions. Many of these functions will need to store state data in a database which will require the use of appropriate credentials. However, your corporate security standards mandate the encryption of secret information, such as database passwords.
As a solutions architect, which approach would you direct your team to follow to satisfy this security requirement?