Encryption and Key Management - Scenario Follow-Up Pack
Source document: 08-encryption-key-management.md
These folders reuse the four reference scenarios from 01-prompt-injection-defense.md and adapt the follow-up questions to the encryption, key isolation, secrets rotation, and cryptographic access control lens.