Software Bill of Materials (SBOMs): A Practical Guide to Implementing NIST/CISA's SBOM Requirements

categories icon Webinar

As a result of the May 2021 Executive Order on Improving the Nation’s Cybersecurity (EO #14028), the US Department of Commerce published details for the “minimum elements” of a Software Bill of Materials (SBOM). This webinar provides an overview of the executive order, including what constitutes a Software Bill of Materials, and its intended purpose, usage, and shortcomings in software supply chain security. We will then explore how a pipeline bill of materials (PBOM) can be used to expand upon the foundation provided by SBOM requirements to give you more visibility and control over all the components that make up your software supply chain.

This SBOM cybersecurity webinar covers:

  • What an SBOM is and what its capabilities are
  • What guidelines NIST and the Whitehouse EO suggest regarding SBOM requirements
  • Where SBOMs fall short and leave security gaps
  • How to broaden and improve your software supply chain security with a PBOM

Presented by:

Julie Peterson
Julie Peterson
Sr. Product Marketing Manager

Have questions or
want a custom demo?

Get a personalized demo and learn how you can develop secure software, faster with Cycode.

By submitting this form I agree to be contacted by Cycode, and receive occasional offers & product updates via phone or email in line with Cycode's Privacy Policy.

Frequently Asked Questions

What Is the Difference Between a NIST and CISA SBOM?

The difference between a NIST and CISA SBOM lies primarily in their focus within the regulatory landscape. NIST provides the high-level frameworks and security standards, such as the Secure Software Development Framework (SSDF), which mandates the use of SBOMs to verify software integrity. NIST focuses on the "how" of securing the development process, ensuring that the creation of these records is baked into the organization's broader security strategy.

In contrast, the CISA SBOM initiatives focus on the practical implementation and standardization of these manifests for national security and critical infrastructure. CISA works to ensure that SBOM data is communicated in a way that is interoperable and actionable across different sectors. While NIST sets the standard for the security environment, CISA provides the operational guidance to ensure that these records can be used effectively to respond to emerging threats in real-time.

What Are the CISA Minimum Elements for an SBOM?

The CISA SBOM minimum elements represent the essential data points required to make a software manifest useful for vulnerability management and risk assessment. These elements include basic identifying information such as the supplier name, component name, version of the component, and other unique identifiers. These data points allow security tools to accurately cross-reference components against known vulnerability databases like the NVD.

In addition to component details, the CISA SBOM minimum elements require a record of the relationship between components and the timestamp of when the SBOM data was assembled. By standardizing this information, CISA ensures that organizations can automate the consumption of SBOMs across different platforms. This consistency is vital for large-scale security automation, allowing teams to quickly determine if a specific vulnerability exists within their complex software ecosystem.

How Does a Pipeline Bill of Materials Complement an SBOM?

A Pipeline Bill of Materials (PBOM) complements an SBOM by shifting the focus from the code itself to the tools and processes used to build that code. While an SBOM tells you what is inside the software, a PBOM provides a record of the build environment, including the compilers, CI/CD configurations, and build scripts used during the lifecycle. This provides a comprehensive view of pipeline security by ensuring that the "factory" hasn't been tampered with.

Together, these two records provide a 360-degree view of software integrity. An SBOM might show that the libraries are secure, but without a PBOM, you cannot be certain that a malicious actor didn't inject code during the build process itself. By combining both, enterprises can verify that they are delivering secure code produced by a secure and authenticated pipeline, effectively closing the loop on software supply chain protection.