Ultimate access to all questions.
Your organization is concerned about application vulnerabilities in production that have led to security breaches. You need to automatically scan your deployment pipeline for vulnerabilities and ensure only approved, scanned containers can run in your environment. What should you do?