Infrastructure Resource Profiles control how systems allocate compute, network, and storage. They bind settings to workloads, users, and accounts. When profiles include sensitive data — like API keys, database credentials, secrets, or internal network identifiers — they become attack surfaces.
Sensitive data inside these profiles is often hidden in YAML files, JSON