When platform-provided mechanisms aren't available, acceptable alternatives for storing sensitive data in managed packages include: 1. **Protected Custom Metadata**: The preferred method for securely storing sensitive data, ensuring it is inaccessible to unauthorized users or external packages. 2. **Protected Custom Settings**: A legacy option requiring a custom UI for managing sensitive data securely. 3. **Named Credentials**: Suitable for locally generated or per-organization secrets, though administrators can view these credentials, so they may not fit all use cases. 4. **Encrypted Custom Objects**: Encrypt sensitive data and store it in custom objects, with the encryption key stored in a protected custom setting or hidden custom metadata API field. Ensure proper permissions for fields containing encrypted secrets and use Apex Crypto calls for encryption. These methods should include appropriate security measures, such as restricting access to administrative users and avoiding sensitive data in debug logs.