Explain auth, key rotation, secrets, and incident response | Robinhood Interview Question