• Detect vulnerabilities as far “left” in our software delivery pipeline as possible,
  • Cast a wide enough net in our search for vulnerabilities to avoid missing any, and
  • Form a comprehensive understanding of the impact of any vulnerabilities we do find.