More specifically, for many products we have significant numbers of automated tests and security scans that are executed as part of our continuous integration and deployment pipelines:
Secure architecture, configuration management and patching known vulnerabilities are the keys to data security hygiene. Changes to code, database and infrastructure configurations that may induce customer impact are subject to a documented change management process involving risk analysis, testing and verification prior to installation on production systems.