Organizations rely on a combination of internal systems and cloud services to run their business, all of which require sensitive credentials, such as API keys, SSH