Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCyber Tactics ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementLogical Security

Cyber Tactics

Better software supply chain security through SBOMs

Creating a cybersecurity supply chain governance framework is a critical step in securing your organization’s digital supply chain.

By Pam Nigro, Contributing Writer
Data cloud security

Just_Super / iStock / Getty Images Plus via Getty Images

February 12, 2024

An executive order from President Biden in 2021 focused on enhancing software supply chain security. This added transparency can help to identify and mitigate security risks, such as vulnerabilities in open source components or malicious code that has been inserted into the supply chain. These Software Bills of Materials (SBOMs) play an important role in enhancing software supply chain security by providing transparency into the components used to build software. This requirement is designed to help the government to better understand and manage the security risks associated with the software it uses.

The development of commercial software often lacks transparency, security focus, and safeguards against tampering. To ensure software functions securely and as intended, especially critical software, there is a need for more robust and predictable mechanisms. With this in mind, let’s explore the concept of a Supplier/Vendor Software Bill of Materials (SBOM).

In today's interconnected digital landscape, the integrity and security of software components used in products and services are of paramount importance. As organizations rely on an intricate network of suppliers and vendors to source these components, ensuring transparency and understanding the composition of these software elements becomes crucial. This is where the concept of an SBOM comes into play.

What is a SBOM? It is a comprehensive document that provides a detailed inventory of all software components and dependencies used in a particular product or system, including those contributed by suppliers and vendors. It serves as a critical element of supply chain risk management and cybersecurity governance. The SBOM lists each binary component, its version, origin and potential vulnerabilities, enabling organizations to assess the security and compliance of their software supply chain thoroughly.

SBOM serves as a critical tool for transparency, security and risk management. It empowers organizations to make informed decisions about their software components, enabling them to build more secure, compliant and resilient products and services.

Creating a cybersecurity supply chain governance framework is a critical step in securing your organization's digital supply chain. Here's a step-by-step guide to get started:

Governance structure: Establish a dedicated cross-functional team responsible for SBOM governance. This team should include representatives from cybersecurity, software development, procurement, legal and compliance.

Policy and standards: Develop clear policies and standards that mandate the creation, maintenance and sharing of SBOMs for all software products used within the organization. These policies should outline the frequency of updates, data format and sharing mechanisms.

SBOM creation: Define a standardized process for creating SBOMs for each software product. This process should involve automated tools and manual reviews to ensure accuracy and completeness.

Inventory management: Maintain an up-to-date inventory of software components, libraries, frameworks and dependencies used in each software product. Track versions, origins and licenses for all components.


❝

In an era of increasing cyber threats and regulatory scrutiny, the SBOM is a valuable tool that enhances transparency, security, and risk mitigation within the supply chain, ultimately safeguarding the integrity of software, firmware or products.”


Integration with development lifecycle: Integrate SBOM creation and maintenance into the software development lifecycle. Developers should generate SBOMs automatically during the build process, ensuring that each software release is accompanied by an accurate SBOM.

Supplier engagement: Collaborate with software suppliers and vendors to obtain SBOMs for third-party components. Mandate the provision of accurate and timely SBOMs as part of procurement agreements.

Continuous monitoring: Implement continuous monitoring of software components and their vulnerabilities. Regularly update SBOMs to include information about newly discovered vulnerabilities and available patches.

Vulnerability assessment: Integrate vulnerability assessment tools to analyze SBOMs and identify known vulnerabilities and security issues in software components. Prioritize addressing high-risk vulnerabilities.

Remediation and patching: Develop a process for addressing vulnerabilities identified in SBOMs. Define responsibilities for patch management and ensure timely remediation of identified vulnerabilities.

Sharing and transparency: Promote transparency by sharing SBOMs with relevant stakeholders, including internal teams, customers and partners. This fosters accountability and enables better risk assessment.

Compliance and reporting: Ensure compliance with relevant industry standards and regulations that require SBOMs. Generate reports that demonstrate the organization's commitment to software transparency and security.

Incident Response: Incorporate SBOMs into the incident response process. In the case of a security breach or vulnerability exploit, having an accurate SBOM will help identify affected systems quickly.

Training and awareness: Educate software developers, procurement teams and relevant stakeholders about the importance of SBOMs, their role in cybersecurity and the procedures for generating and managing them.

Automation and tools: Invest in automation tools and software solutions that facilitate the creation, maintenance and analysis of SBOMs. These tools can streamline the process and enhance accuracy.

Continuous improvement: Regularly review and update the SBOM governance model to incorporate lessons learned from incidents, changes in software development practices, and evolving cybersecurity threats.

By maintaining an SBOM, organizations can swiftly identify and remediate vulnerabilities, respond to security incidents and ensure that software components are up-to-date and compliant with regulatory requirements. In an era of increasing cyber threats and regulatory scrutiny, the SBOM is a valuable tool that enhances transparency, security, and risk mitigation within the supply chain, ultimately safeguarding the integrity of software, firmware or products.

Remember that cybersecurity supply chain governance is an ongoing process. It requires adaptability and a commitment to continuous improvement to stay ahead of evolving cyber threats and vulnerabilities in today's interconnected business environment.

KEYWORDS: software security supply chain supply chain cyber security supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nigro headshot

Pam Nigro is the Vice President of Security and Security Officer at Medecision. She also is an ISACA Board Director and was the 2022-23 ISACA Board Chair. Image courtesy of Nigro

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • software security

    Understanding SBOMs: A snapshot of your software security

    See More
  • ciso

    4 things CISOs need to know about software supply chain security

    See More
  • warehouse.jpg

    9 out of 10 companies detected software supply chain security risks

    See More

Events

View AllSubmit An Event
  • September 29, 2025

    Global Security Exchange (GSX)

     
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!