One way is we can set up the function to use a secure credential passthrough mechanism to retrieve the secret at runtime. This way, the function itself does not store or expose the secret directly, but rather retrieves it securely when needed.