Evaluate third-party vendor security posture
Collect detailed bug reports from users
Submit requests for system or infrastructure changes
Request access to systems, tools, or environments