A company recognizes the importance of monitoring and securing applications, third-party software, libraries, and dependencies. Which of the following practices directly support this endeavor?

a. Package monitoring
b. Software bill of materials
c. Software composition analysis
d. Credentialed vulnerability scans