Mapping of Secrets and Keys Across Trust Boundaries

A diagram mapping where secrets and keys are created, stored, and used across different trust boundaries such as developer machines, build machines, and production environments.