{"id":20074,"date":"2026-02-27T15:27:42","date_gmt":"2026-02-27T06:27:42","guid":{"rendered":"https:\/\/sparrow.im\/kr\/?p=20074"},"modified":"2026-03-24T14:04:04","modified_gmt":"2026-03-24T05:04:04","slug":"%ea%b5%ad%eb%82%b4%c2%b7%ec%99%b8-%ec%86%8c%ed%94%84%ed%8a%b8%ec%9b%a8%ec%96%b4-%ea%b3%b5%ea%b8%89%eb%a7%9d-%eb%b3%b4%ec%95%88-%ec%a0%95%ec%b1%85-%eb%8f%99%ed%96%a5-%ec%b4%9d%ec%a0%95%eb%a6%ac","status":"publish","type":"post","link":"https:\/\/sparrow.im\/kr\/2026\/02\/27\/supply-chain-security-policy-trends\/","title":{"rendered":"\uad6d\ub0b4\u00b7\uc678 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uacf5\uae09\ub9dd \ubcf4\uc548 \uc815\ucc45 \ub3d9\ud5a5 \ucd1d\uc815\ub9ac"},"content":[59],"excerpt":{"rendered":"<p>\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uacf5\uae09\ub9dd \uacf5\uaca9\uc774 \ud604\uc2e4\uc801\uc778 \uc704\ud611\uc73c\ub85c \ub5a0\uc624\ub974\uba74\uc11c, \uac01\uad6d\uc740 \uacf5\uae09\ub9dd \ubcf4\uc548\uc744 \uac15\ud654\ud558\uae30 \uc704\ud55c \uc815\ucc45\uacfc \uc81c\ub3c4 \ub9c8\ub828\uc5d0 \uc18d\ub3c4\ub97c \ub0b4\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ud2b9\ud788 SBOM(\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uc790\uc7ac\uba85\uc138\uc11c)\uc744 \uc911\uc2ec\uc73c\ub85c \ud55c \ud22c\uba85\uc131 \ud655\ubcf4\uc640 \ubcf4\uc548 \uac70\ubc84\ub10c\uc2a4 \uad6c\ucd95\uc740 \uc774\uc81c \uc77c\ubd80 \uae30\uc5c5\uc758 \uc120\ud0dd\uc774 \uc544\ub2c8\ub77c, \uae00\ub85c\ubc8c \uc2dc\uc7a5\uc5d0\uc11c \uc694\uad6c\ub418\ub294 \uae30\ubcf8 \uc694\uac74\uc73c\ub85c \uc790\ub9ac \uc7a1\ub294 \ubd84\uc704\uae30\uc785\ub2c8\ub2e4. \uc774\ubc88 \uae00\uc5d0\uc11c\ub294 \ubbf8\uad6d, \uc720\ub7fd, \uad6d\ub0b4\ub97c \ud3ec\ud568\ud55c \uc8fc\uc694 \uad6d\uac00\ub4e4\uc758 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uacf5\uae09\ub9dd \ubcf4\uc548 \uc815\ucc45\uacfc \uc804\ub7b5 \ub3d9\ud5a5\uc744 \uc0b4\ud3b4\ubcf4\uace0, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":21595,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[1],"tags":[],"topic":[77,80],"class_list":["post-20074","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","topic-topic-software-security","topic-topic-guideline","content-content-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/posts\/20074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/comments?post=20074"}],"version-history":[{"count":19,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/posts\/20074\/revisions"}],"predecessor-version":[{"id":21609,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/posts\/20074\/revisions\/21609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/media\/21595"}],"wp:attachment":[{"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/media?parent=20074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/categories?post=20074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/tags?post=20074"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/topic?post=20074"},{"taxonomy":"content","embeddable":true,"href":"https:\/\/sparrow.im\/kr\/wp-json\/wp\/v2\/content?post=20074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}