As a company matures, its attack surface also grows. Additionally, the company becomes an increasingly desirable target for a malicious actor to compromise its systems. A company must monitor all software usage, secure applications, third-party software, libraries, and dependencies. Which of the following would contribute to protecting the business's operations? (Select the three best options.) A.Package monitoring B.Software Bill of Materials C.Software composition analysis D.Credentialed scan