Your organization is concerned about recent news reports of security breaches caused by application vulnerabilities in production systems. To ensure security, you want to automatically scan your deployment pipeline for vulnerabilities and only allow scanned and verified containers to run in your environment. What should you do?