A software company is designing a secure and scalable approach to help its developers encrypt sensitive data within their applications. The company wants to minimize the time spent managing keys, enforcing permissions, and handling rotation. Which solution should a solutions architect recommend to reduce the operational overhead while maintaining strong security?