Topics include Supply Chain Security, Vulnerability Management, Neat Tricks, and Contributor insights.
The software supply chain is a model for producing quality products with an integrated lifecycle of upstream and downstream dependencies. An SBOM is a key component of the software supply chain. SBOM adoption has increased exponentially considering legal, compliance, and security considerations. This article briefly introduces SBOM and describes its usage in the Software Delivery Life Cycle (SDLC).
An SBOM is a formal record containing the details and supply chain relationships of various components used in building software. Software developers and vendors often create products by assembling existing open source and commercial software components. The SBOM enumerates these components in a product (as defined by NIST SP 800-161r1).
SBOMs can be generated in a variety of SBOM formats (for both human and machine-readable formats). Primarily supported formats are:
While SBOM generates comprehensive information, these are the minimum viable information required:
While there are many different areas of SBOM usage, below are the three most common usage of SBOMs:
Gartner expects the adoption of software bills of material (SBOM) by enterprise organizations to go from less than 5% now to 60% by 2025.
“Protecting Yourself Will Lead To Protecting The Industry” - Forrester.
At every supply chain level, the shift from herd vulnerability to herd immunity highlights the cumulative, public health-like benefits of the added transparency and resiliency unlocked by SBOMs (NIST). Large and small enterprises will benefit from the insights that SBOMs provide. Critical to the process is the consumption and catalog of SBOM data along with the versions of components managed across the SDLC. An illustration of the end-to-end SBOM data analysis flow is shown below:
Acronym | Description |
---|---|
CVE | Common Vulnerabilities and Exposures |
HBOM | Hardware bills of materials: every physical piece or component used to build a product. |
NIST | NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. |
OWASP | The Open Web Application Security Project |
SBOM | Software Bill of Materials |
SCA | Software Composition Analysis |
VDR | Vulnerability Disclosure Report (VDR) is an attestation by a software vendor showing that the vendor has checked each component of a software product SBOM for vulnerabilities and reports on the details of any vulnerabilities reported by a NIST NVD search. |
VEX | Vulnerability-Exploitability eXchange: an attestation, a form of a security advisory that indicates whether a product or products are affected by a known vulnerability or vulnerabilities. |
Ankur is a Senior engineering leader with more than 20 years of IT industry experience. He is a leader in multi-year digital transformation programs at all stages of the software delivery lifecycle, including strategy, planning, architecture & design, implementation, and site reliability. He is a results-driven core technologist with experience in Cloud, Microservices, Event-driven, and Web-scale distributed architectures.
Ankur works with the Ortelius community on outreach events and has presented at the Ortelius bi-annual Visionaries Summit. Learn more about Ankur from his LinkedIn Profile.