Cybersecurity Security over the total application lifecycle: Understanding assets, threat models "In most cases, it’s easier and more efficient to have a pipeline run when a change is detected in a key component"