Skip to content

Commit 72b5e1c

Browse files
authored
Merge pull request #10 from shiftleftcyber/jason
Adding another blog post
2 parents f30a0ef + 3346e26 commit 72b5e1c

2 files changed

Lines changed: 49 additions & 0 deletions

File tree

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "What's Inside an SBOM? 🧠"
4+
date = "2025-05-11"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_sbom-cybersecurity-softwaredevelopment-activity-7320829663931510785-XfKw"
6+
image = "img/thirdparty/sbom-high-level-object-model-cyclonedx.jpeg"
7+
+++
8+
9+
(Image sourced from OWASP CycloneDX SBOM/xBOM Standard) - https://cyclonedx.org/specification/overview/
10+
11+
A Software Bill of Materials (SBOM) is more than just a list of libraries - it's a structured, detailed map of what makes up your software. πŸ’»
12+
13+
But not all SBOMs are created equal. Some are like handwritten grocery lists. πŸ“ Others? Like detailed warehouse inventory sheets. πŸ“‹πŸ­
14+
15+
So what goes in a useful SBOM? πŸ€”
16+
17+
Core Components:
18+
19+
* πŸ“¦ Component name
20+
* #️⃣ Version number
21+
* πŸ†” Unique identifier
22+
* πŸ”— Source or download location
23+
* πŸ“œ License type
24+
25+
Metadata for Lifecycle:
26+
27+
* πŸ§‘β€ Who created the SBOM
28+
* πŸ•’ When it was generated
29+
* πŸ”§ What tools created it
30+
* 🏷️ What product or build it refers to
31+
32+
A well-formed SBOM also helps to strengthen security enabling you to:
33+
34+
* πŸ” Detect vulnerabilities
35+
* 🚨 Respond quickly to incidents
36+
* πŸ“œ Verify open-source license compliance
37+
* πŸ›‘οΈ Build trust across your software supply chain
38+
39+
And here's the kicker - just having an SBOM isn't enough. You also need to know:
40+
41+
* πŸ€” Can you trust it?
42+
* πŸ•΅ Has it been tampered with?
43+
* πŸ’Ž Is it authentic?
44+
45+
That's where digital signatures, hashing, and attestations come in β€” helping prove who created the SBOM, what build it came from, and that it hasn't been altered in transit. πŸ”
46+
47+
Because in security, trust must be earned and verifiable. 🀝
48+
49+
#SBOM #CyberSecurity #SoftwareDevelopment #SupplyChainSecurity #DevSecOps #OpenSourceSecurity #SoftwareSupplyChain #SoftwareTransparency #DigitalTrust #SecureDevelopment #SBOMAnatomy #SoftwareIntegrity πŸ’ΎπŸ”
173 KB
Loading

0 commit comments

Comments
Β (0)