> You do not need to manage the encryption keys because they are protected by our own key management infrastructure, which implements strong logical and physical security controls to prevent unauthorized access.
Ah ja...
2x
Ah ja...
2x