• Auditing container images for vulnerabilities.
  • Setting up security scanning in MSR.
  • Integrating security scans into continuous integration pipelines.