https://ones.com/blog/comparison/security-vulnerability-scan-best-practices/