Shift Left Security Strategy Example