Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsGovernment: Federal, State and Local

6 areas to watch in the Software Bill of Materials evolution

By Lena Smart
security

Image from Pixabay

August 15, 2022

A little more than a year ago — in response to SolarWinds and Log4j exploits — the White House issued Executive Order 14028 on Improving the Nation's Cybersecurity.

Of particular emphasis in that order was the mandate to enhance software supply chain security, and, more specifically, the introduction of the Software Bill of Materials (SBOM).

Commercial software often lacks transparency, sufficient focus of the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors. Essentially an SBOM is a list of ingredients, components and libraries used by software — in theory it will allow organizations to determine exactly which third-party commercial and open-source software makes up the enterprise software package.

Here are some of the most important SBOM discussions that should be on every security leader’s radar as the security strategy graduates from the definitions phase and makes the first steps toward real-world implementations:

1. The front- and back-ends of SBOMs still yet to be defined

SBOMs will need a secure back-end layer for storage and integrations. Developers will need a front-end that brings security vulnerabilities into their workflow in a way that doesn’t cripple productivity.

2. Automation will be critical

Maintaining terabytes of data and logs that no one is looking at is a waste of time and money. Federal and state governments — by virtue of the Executive Order — will be the first major consumer of SBOMs. But for SBOMs to take off, they will need to be designed with automation in mind. For SBOMs to take off in government, they will need to bring automation to the Federal Risk and Authorization Management Program (FedRAMP) process.

3. Continuous monitoring may help maintain SBOMs

The world has so much software — open source projects, programming language frameworks and libraries — that not only did most organizations not know about the Log4J vulnerability, but even when they did know, they didn’t know if and where they were running Log4J. One SBOM feature will be continuous monitoring that tells organizations not only when something has changed that changes their security posture, but if and where they are running it.

4. Without uniformity of SBOM information, this will be a mess

As an industry, cybersecurity leaders should aim to streamline the SBOM process and treat it as uniformly as possible. The worst scenario is having a complex framework that nobody understands and therefore ignores. Security leaders should think of SBOMs as a first step in software supply chain security.

5. There will be multiple SBOM frameworks

National Institute of Standards and Technology (NIST) and Open Web Application Security Project (OWASP) have different frameworks. The government can not determine that an organization must have one framework over another, but companies will need to be agile enough to be able to consider any SBOM framework.

6. Better collaboration between companies and agencies

The SBOM's ability to accelerate collaboration between security peers will have a great impact on the nation. Theoretically, if the cybersecurity field can achieve better information sharing on security exploits through SBOMs, the country is going to see a lot more of this type of collaboration in safe spaces.

Log4j and SolarWinds woke the industry up to the side doors presented by insecure software artifacts and the exploits made possible by their transitive nature. Government and companies alike are in total agreement that organizations need to know what’s inside their software and where it is running — and that this is step one in this software supply chain security movement.

KEYWORDS: cyber attack cyber security awareness government regulation software supply chain cyber security third-party risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Lena smart

Lena Smart joined MongoDB in March 2019, with more than 20 years of cybersecurity experience. Before joining MongoDB, she was the Global Chief Information Security Officer for the international fintech company, Tradeweb, where she was responsible for all aspects of cybersecurity. She also served as CIO and Chief Security Officer for the New York Power Authority, the largest state power organization in the country.

Smart is a founding member of Cybersecurity at MIT Sloan, formerly the Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity, which allows security leaders in academia and the private sector to collaborate on tackling the most challenging security issues. Smart is a member of IT-ISAC, frequently speaks at industry events and has been featured in Fortune, Dark Reading and CSO Online.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Code

    CISA Issues Software Bill of Materials Draft, Encourages Public Comments

    See More
  • cyber_lock

    The Necessary Evolution of SecOps to DevSecOps

    See More
  • Sureview screen

    The Evolution of Automation in the Command Center

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing