A software bill of materials has quickly become one of the most important tools for tackling compliance and improving software supply chain risk management. They provide a comprehensive breakdown of a software’s components, dependencies, and open-source licenses, enabling stakeholders to identify vulnerabilities and take proactive steps to mitigate risks.
In this article, we’ll dive into the significance of SBOMs for cybersecurity and look at the compliance landscape and the industries requiring SBOMs, their formats and essential features, and the best practices for implementing SBOMs.
The regulatory landscape surrounding SBOMs is evolving rapidly, with various frameworks and standards mandating their use across industries and regions. Entities like the National Institute of Standards and Technology (NIST), the Food and Drug Administration (FDA), and the EU Cybersecurity Act have all issued guidelines or regulations requiring SBOMs in specific contexts. Let’s look at each in more detail.
As part of NIST’s SBOM guidance, federal agencies must ensure that any software supplier or contractor can produce SBOMs that conform with the EO and NTIA’s “The Minimum Elements for a Software Bill of Materials (SBOM).”
This means that SBOMs must contain
You can read more about NIST’s guidance here.
The FDA’s cybersecurity guidance relating to SBOMs requires medical device manufacturers to produce a software bill of materials that conforms to the NTIA requirements outlined above. Under this new guidance, the FDA can refuse to accept submissions that don’t possess the proper cybersecurity controls.
The guidance states that applicants must
You can read more about the FDA’s cybersecurity guidance here.
Under proposed changes to its Cyber Resilience Act (CRA), the EU outlines a number of cybersecurity regulations, including providing a Software Bill of Materials documenting vulnerabilities and components in the product. This documentation must be accompanied by
The guidelines also outline obligations relating to risk assessments, vulnerability reporting, and conformity assessments, which you can read more about here
There are a number of industries that require (or heavily encourage) the use of SBOMs. These include (but are not limited to)
In an effort to improve collaboration and distribution, software bills of materials have two prevalent formats: SPDX (Software Package Data Exchange) and Cyclone DX.
To meet compliance requirements, all SBOMs must (at minimum) include the following:
Related: 6 Predictions for the Future of SBOM and Software Supply Chain Security
To maximize the effectiveness of SBOMs, organizations should implement the following best practices.
1. Conduct regular audits and assessments of SBOM processes to ensure accuracy and completeness.
2. Integrate SBOMs into their cybersecurity posture and risk management frameworks.
3. Implement mechanisms for ongoing monitoring of the software supply chain, including vulnerability scanning and threat intelligence feeds.
4. Provide ongoing training and educational resources to stakeholders involved in SBOM management to enhance awareness and proficiency.
5. Implement access controls to prevent unauthorized modifications or access to SBOMs.
6. Make SBOMs readily available to relevant stakeholders to facilitate transparency (this includes developers, security teams, customers, and regulatory authorities).
7. Track SBOM changes by implementing version controls and change-tracking mechanisms to maintain a clear audit trail.
Create, import, manage, and distribute SBOMs in minutes with Finite State.