What are three key components of a threat-centric SOC? (Choose three.)