Know your architecture

Threat modeling

Dependency tracking

Champion security

Use the pipeline

The platform does it