_________ approach aims to include security in each phase of the development cycle.
1. Shift Left security
2. Continuous Security
3. Shift Right Security
4.Consistent Security