Which are three key security vectors customers need to monitor to overcome security challenges? (Choose three.)