[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-07-15 (世界標準時間)。"],[[["Utilize the Cloud Storage state backend for Terraform state management to enable team collaboration and separate sensitive information from version control."],["Encrypt the Terraform state using customer-supplied encryption keys via the `GOOGLE_ENCRYPTION_KEY` environment variable, even though no secrets should be in the state file."],["Avoid storing secrets directly within the Terraform state file, as certain providers like `vault_generic_secret` and `google_service_account_key` may store them in plaintext."],["Mark sensitive outputs as such within Terraform configurations to prevent the exposure of sensitive data in command-line output and implement separation of duties by restricting access to Terraform resources."],["Implement pre-apply checks with tools like `gcloud terraform vet` and continuous audits using Security Health Analytics, InSpec, or Serverspec to detect security regressions and ensure infrastructure security."]]],[]]