After a scan completes, members of the application security and development teams can review the list of flaws and: Provide collaborative comments Propose mitigating factors Review all feedback