[{"data":1,"prerenderedAt":115},["ShallowReactive",2],{"glossary-page-\u002Fglossary\u002Fsbom":3},{"id":4,"title":5,"body":6,"description":103,"extension":104,"meta":105,"navigation":110,"path":111,"seo":112,"stem":113,"__hash__":114},"docs\u002Fglossary\u002Fsbom.md","SBOM",{"type":7,"value":8,"toc":95},"minimark",[9,15,20,30,34,37,63,67,70,74],[10,11,12],"glossary-title",{},[13,14,5],"p",{},[16,17,19],"h2",{"id":18},"what-is-an-sbom","What Is an SBOM?",[13,21,22,25,26,29],{},[23,24,5],"strong",{}," stands for ",[23,27,28],{},"Software Bill of Materials"," and refers to an inventory of components, libraries, and dependencies used in a software application.",[16,31,33],{"id":32},"why-sbom-matters","Why SBOM Matters",[13,35,36],{},"SBOMs help organizations:",[38,39,40,47,52,57],"ul",{},[41,42,43,46],"li",{},[23,44,45],{},"understand dependency exposure",",",[41,48,49,46],{},[23,50,51],{},"respond faster to vulnerability disclosures",[41,53,54,46],{},[23,55,56],{},"improve compliance and auditability",[41,58,59,62],{},[23,60,61],{},"increase software supply chain visibility",".",[16,64,66],{"id":65},"how-oobeya-uses-sbom-context","How Oobeya Uses SBOM Context",[13,68,69],{},"In Oobeya, SBOM-related thinking is relevant where engineering leaders want to connect software supply chain risk with quality, release, and governance decisions.",[16,71,73],{"id":72},"related-terms","Related Terms",[38,75,76,83,89],{},[41,77,78],{},[79,80,82],"a",{"href":81},"\u002Fglossary\u002Fsoftware-composition-analysis","Software Composition Analysis",[41,84,85],{},[79,86,88],{"href":87},"\u002Fglossary\u002Fdevsecops","DevSecOps",[41,90,91],{},[79,92,94],{"href":93},"\u002Fglossary\u002Fsonarqube","SonarQube",{"title":96,"searchDepth":97,"depth":97,"links":98},"",2,[99,100,101,102],{"id":18,"depth":97,"text":19},{"id":32,"depth":97,"text":33},{"id":65,"depth":97,"text":66},{"id":72,"depth":97,"text":73},"SBOM stands for Software Bill of Materials and refers to an inventory of components, libraries, and dependencies used in a software application.","md",{"category":106,"tags":107},"S",[108,88,109],"Security","Concept",true,"\u002Fglossary\u002Fsbom",{"title":5,"description":103},"glossary\u002Fsbom","O5Hw0B-Me1YDU0D4rO2WNr-Wqi0SLb6O1JgeSZEDWBQ",1776167600884]