Core Concept
What is an SBOM?
A Software Bill of Materials (SBOM) is a formal, machine-readable inventory of software components and dependencies within a software product. It describes the supply chain relationships between components used in building software, providing transparency into the composition of code.
Foundational
Standard
SPDX Format
Software Package Data Exchange (SPDX) is an open standard maintained by the Linux Foundation for communicating SBOM information including component provenance, licensing, and security references. SPDX supports RDF, JSON, YAML, XML, and tag-value formats.
ISO/IEC 5962:2021
Standard
CycloneDX
CycloneDX is a lightweight SBOM standard designed for use in application security contexts and supply chain component analysis. Originated from the OWASP community, it supports BOM types for software, hardware, services, and cryptographic assets.
OWASP Foundation
Policy
Executive Order 14028
Signed May 2021, this U.S. executive order on Improving the Nation's Cybersecurity mandated SBOM adoption for software sold to the federal government. It directed NTIA to publish minimum elements for SBOMs and catalyzed industry-wide adoption efforts.
U.S. Government
Process
SBOM Generation
SBOMs can be generated through build-time instrumentation, source code analysis, or binary analysis. Build-time generation captures the most accurate dependency information directly from package managers, compilers, and build systems during the software creation process.
Tooling
Security
Vulnerability Correlation
SBOMs enable automated vulnerability tracking by mapping component identifiers (CPE, PURL) against vulnerability databases like the NVD. When a new CVE is published, organizations can instantly determine which products contain the affected component.
CVE / NVD
Ecosystem
Supply Chain Security
Modern software comprises 70-90% open source components. SBOMs bring transparency to complex dependency chains, enabling organizations to assess risk, ensure license compliance, and respond rapidly to incidents like Log4Shell that exploit transitive dependencies.
Risk Management
Specification
Minimum Elements
The NTIA defines baseline SBOM attributes: supplier name, component name, version, unique identifiers, dependency relationships, author of the SBOM, and timestamp. These minimum elements ensure interoperability across tools and organizations.
NTIA Guidelines
Tooling
Generation Tools
Popular SBOM generation tools include Syft, Trivy, cdxgen, and Microsoft SBOM Tool. These tools analyze package manifests, container images, and file systems to produce SBOMs in SPDX or CycloneDX formats, integrating into CI/CD pipelines.
Open Source
Concept
VEX Statements
Vulnerability Exploitability eXchange (VEX) documents complement SBOMs by communicating whether a product is affected by a specific vulnerability. VEX allows vendors to assert status: not affected, affected, fixed, or under investigation.
CISA Framework
Compliance
License Management
SBOMs enumerate the licenses of all included components, enabling legal teams to verify compliance with open source obligations. Automated license scanning cross-references SBOM data against organizational policies to flag copyleft or restrictive licenses.
Legal & Governance
Architecture
SBOM Sharing
SBOMs can be distributed alongside software releases, hosted in dedicated repositories, or exchanged through APIs. Standards like SBOM Exchange API and platforms like Dependency-Track facilitate automated ingestion, storage, and querying of SBOM data at scale.
Distribution