No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

SBOMs Still More Mandate Than Security

July 15, 2023
in Protection
0
SBOMs Still More Mandate Than Security



Software bills of materials are having a moment.

Following an executive order issued by the Biden administration in May 2021, the software manifests, which outline the components and dependencies used both directly and indirectly to develop applications, are now required by the US government of all federal contractors. Given the low bar for producing a software bill of materials (SBOM) — an increasing variety of tools used during development can also produce one — the lists of application ingredients are proliferating. As a result, nearly half of all companies also now require SBOMs for any software. This number is expected to hit 60% by 2025, compared with less than 5% in 2022, according to data from market research firm Gartner.

The federal mandates have resulted in a rush to SBOMs and changes in how developers are documenting their software, says Stephen Magill, vice president of product innovation at Sonatype, a software development tools firm.

“The SBOM mandates that are coming out from government and from regulators provide an important incentive to up-level your development process and get a tool in place,” he says. “That’s a large part of why these regulations are coming in. It’s because the industry has not universally adopted this tooling, and open source continues to be a huge area of risk that, in many organizations, is just unmanaged.”

The rush to keep up with the government mandate is leading to fast evolution within the industry, as standards attempt to account for various ingredients that go into developing software. In June, for example, the Open Worldwide Application Security Project (OWASP) announced version 1.5 of its SBOM standard, CycloneDX, which now includes information on the machine learning (ML) models used in a particular application, as well as a measure of the quality of the SBOM.

While current SBOMs are often little more than lists of software components, the eventual goal is to give organizations a way to identify and document weaknesses in their software, says Thomas Pace, CEO of extended IoT security firm NetRise.

“Currently, end users have the issue of making decisions based on incomplete data, especially as it pertains to … devices running firmware, which is still a black box for the overwhelming majority of organizations,” he says. “Once they have these SBOMs, they can finally make data-driven decisions around the risk of the various devices, applications, and systems that they are utilizing.”

SPDX, CycloneDX, and SWID Standards

The US government recognizes three SBOM standards as meeting their minimum requirements: Software Identification (SWID) tags, the Software Package Data Exchange (SPDX), and CycloneDX.

In 2009, the International Standards Organization (ISO) created SWID tags as a way for organizations to track the software installed on their managed systems. More than a decade ago, the Linux Foundation created the SPDX to aid in the exchange of information about licensing. In 2017, OWASP created CycloneDX as a way to exchange data on SBOMs.

The three standards overlap significantly, but SPDX and CycloneDX seem to have the most momentum. There are also nuances between them — SPDX still has a greater focus on license management and the degree to which it supports machine readability. In practice, however, both consumers and providers of SBOMs should be able to work with the formats, says Fernando Montenegro, a senior principal analyst for cybersecurity at analyst firm Omdia, a sibling of Dark Reading.

“If you’re a developer, you can use SBOMs to more easily track the dependencies you will inherit in your own software as you add different modules. This will help you make better decisions about security,” he says. “If you’re a security team, those SBOMs provided by your vendors can help you understand what components are running on your environment … you can more easily prioritize remediation actions across your systems.”

Moving Beyond Awareness

Visibility and awareness are the primary benefits of SBOMs at present. CycloneDX SBOMs, for example, contain information on the software licenses, low-code services, and machine-learning models used in development, as well as information on vulnerability disclosure and annotations. Because 95% of vulnerabilities are not in the direct dependencies used to build software but in the indirect dependencies included by those components’ developers, most companies do not have good visibility into the risk of procured software, says Jamie Scott, a product manager for Endor Labs, a software risk management firm.

“People want to understand their software and inventory, so they can make informed risk management decisions, and they can do that reasonably well with SCA [software composition analysis] for the software that they create,” he says. “But for the software that they procure, they lack that visibility. So SBOMs are about getting visibility into your first- and third-party applications, so that you have a full software inventory.”

Yet SBOMs will increasingly become operationalized, says Zach Capers, senior security analyst at Capterra, a software market services firm. The company’s surveys have found that nearly half (49%) of companies require SBOMs as part of their current software procurement process.

“Just as software buyers can leverage SBOMs to improve visibility throughout their software supply chain, so too can software developers better track components used to develop their products,” he says. “We’re still in the early stages, but eventually you will learn about a newly discovered vulnerability and instantly be able to determine whether or not it lurks somewhere in your company’s software stack, thanks to SBOMs.”

The current set of changes are more about expanding the scope of what is documented using SBOMs, but eventually a variety of risk measures — and potential security controls — could be keyed to SBOMs, possibly leading to a regimen for software liability.

Machine Learning, Automation a Focus

When attackers began exploiting the Log4j vulnerabilities using the Log4Shell proof-of-concept, companies scrambled to determine whether the widespread open source component was in their environments.

When security professionals “think back to Log4Shell, part of the challenge for many organizations was answering whether or not they were using Log4j and were vulnerable,” says Josh Thorngren, head of developer advocacy at ForAllSecure, a security testing firm. “Organizations with SBOMs will be able to answer that question faster than those without, [and] over time we’ll start to see that variance and hear those reactions from security practitioners in the wild.”

In addition, software systems will likely automate their responses to known vulnerabilities. Companies will understand the vulnerabilities in their products, especially those from indirect dependencies, and — following the announcement of a new vulnerability — be able to implement controls, says NetRise’s Pace.

“Now you can implement a compensating control that detects traffic targeting that device specifically around those … available exploits, which basically all firewalls and intrusion detection systems are capable of today,” Pace says. “Without the SBOM, you are totally blind to these risks and are simply hoping the device manufacturers have developed a perfectly secure device, which of course is impossible.”

Editorial Team

Editorial Team

Related Posts

10 Shows Like 'Shōgun' You Should Watch Next
Protection

10 Shows Like ‘Shōgun’ You Should Watch Next

February 26, 2026
Google Just Announced Three New Gemini Upgrades for Galaxy S26 and Pixel 10
Protection

Google Just Announced Three New Gemini Upgrades for Galaxy S26 and Pixel 10

February 26, 2026
Samsung Just Announced the Galaxy S26 Series
Protection

Samsung Just Announced the Galaxy S26 Series

February 26, 2026
Why the Galaxy S26 Got a Price Hike
Protection

Why the Galaxy S26 Got a Price Hike

February 26, 2026
Samsung Is Very Confident in the Galaxy S26 Series' Cameras
Protection

Samsung Is Very Confident in the Galaxy S26 Series’ Cameras

February 26, 2026
10 Hacks Every Telegram User Should Know
Protection

10 Hacks Every Telegram User Should Know

February 26, 2026
Load More
Next Post
Tourists are back. Is it time to tell them to stay away?

Tourists are back. Is it time to tell them to stay away?

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • 23 Dublin Restaurants to Visit in 2026

    0 shares
    Share 0 Tweet 0
  • One Key Travel Rewards Guide

    0 shares
    Share 0 Tweet 0
  • What The Clarity Act Means For Ripple And XRP Once Done

    0 shares
    Share 0 Tweet 0

Latest News

Top reasons why POL price may jump soon

Centrifuge token surges over 180% following Upbit exchange listing announcement

February 26, 2026
0

Centrifuge jumps ~180% in hours on Upbit listing, then eases as traders take profits and mixed technicals flash caution. Summary...

Exclusive-Ivory Coast to cut farmer cocoa price with earlier start of mid-crop, sources say

Exclusive-Ivory Coast to cut farmer cocoa price with earlier start of mid-crop, sources say

February 26, 2026
0

Exclusive-Ivory Coast to cut farmer cocoa price with earlier start of mid-crop, sources say

Man Group reports steady increase in private credit and CLOs

Man Group reports steady increase in private credit and CLOs

February 26, 2026
0

Man Group has grown its private credit and collateralised loan obligation (CLOs) segments following its acquisition of US private credit...

‘I live in a state with no inheritance tax’: Is it legal to deposit $150K cash into my bank account?

‘I live in a state with no inheritance tax’: Is it legal to deposit $150K cash into my bank account?

February 26, 2026
0

“The money is not currently in a bank account and it is not part of an estate.”

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.