You have a CI/CD pipeline that executes Terraform to provision resources in AWS. Terraform currently uses privileged credentials that were manually created in AWS and are valid 24/7. Your security team has asked you to improve this process using Vault and limit the access to AWS only when it's needed.
Which of the following would allow you to improve this process and increase the security of this pipeline?
Your organization recently suffered a security breach on a specific application, and the security response team believes that MySQL database credentials were likely obtained during the event. The application generated the credentials using the database secrets engine in Vault mounted the path database/.
How can you quickly revoke all of the secrets generated by this secrets engine?