Skip to content

Commit 78163dc

Browse files
authored
Merge pull request #16 from shiftleftcyber/jason
Adding Blog Posts
2 parents 71c10c3 + 4a68dcd commit 78163dc

6 files changed

Lines changed: 151 additions & 0 deletions
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "The Evolution of SBOMs at OwnersBox"
4+
date = "2025-06-03"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_the-evolution-of-sboms-at-ownersbox-practical-activity-7335755375452823552-tvyL"
6+
image = "img/thirdparty/2025-06-03-evolution-of-sboms-at-ownersbox.png"
7+
+++
8+
9+
I gave a presentation at the CISA SBOM Community Weekly Meeting yesterday where I shared how we approached SBOMs in my latest role at OwnersBox. SBOM adoption here was driven by a real need rather than just to check a box on some regulatory/compliance framework requirement (these checkboxes later became an added benefit).
10+
11+
In my presentation I covered:
12+
13+
😱 The real-world incident that triggered our SBOM journey
14+
15+
🛠️ How we built and automated SBOMs into our pipelines
16+
17+
📝 Custom tooling to turn raw SBOMs into actionable insights
18+
19+
✨ The impact on risk, compliance and development culture
20+
21+
🧐 Where I see SBOMs going next - towards secure and trustable software transparency
22+
23+
During the presentation, I also shared a fun (and slightly chaotic) story from the technical due diligence process during the acquisition of the first startup I worked at.
24+
25+
Back then, SBOMs didn't exist. So I had to manually compile a list of all third-party software we were using. And since the team wasn't yet aware of the potential acquisition, I had to do it somewhat quietly.
26+
27+
What followed was a week or two of digging through git repos and build files, piecing everything together by hand. 🤯
28+
29+
It really drove home how far we've come and how valuable structured, automated SBOMs are today.
30+
31+
I hope it helps others working to operationalize software transparency in their organizations and highlights that the real value goes far beyond simply checking a box for regulatory or compliance framework requirements.
32+
33+
Thanks again Allan Friedman, PhD for the invite and continuing to bring the SBOM community together and promoting software transparency.
34+
35+
👉💬 Curious to see the full deck? Comment "SBOM" and I'll DM you the Google Slides link.
36+
37+
#SBOM #SoftwareSupplyChain #DevSecOps #AppSec #CyberSecurity #CISA #Startup #SoftwareSecurity #OpenSourceSecurity #SecurityEngineering #SoftwareTransparency #SecureByDesign #SupplyChainSecurity
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "🔏 SBOM Signing ≠ Security"
4+
date = "2025-06-08"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_sbom-softwaresecurity-supplychainsecurity-activity-7341132648515346437-FqBE/"
6+
image = "img/thirdparty/2025-06-08-sbom-signing-checklist.jpeg"
7+
+++
8+
9+
Just because an SBOM is signed doesn't mean it's safe.
10+
11+
Signing is still important though. It gives you integrity. You know the SBOM wasn't tampered with after it was produced.
12+
13+
But integrity ≠ trustworthiness.
14+
15+
Here's why:
16+
17+
🧱 Garbage In, Garbage Out
18+
19+
If the SBOM was generated incorrectly, with missing or outdated components, signing it just seals in the errors.
20+
21+
🎭 Signed ≠ Honest
22+
23+
A signature only tells you who signed the SBOM. It says nothing about whether they were truthful, competent, or even authorized to sign it.
24+
25+
📅 Is It Still Current?
26+
27+
Software changes fast. An SBOM signed last week may already be outdated. If you can't link the SBOM to a specific build artifact or verify it's up to date, the signature alone doesn’t help.
28+
29+
⚖️ Trust is Contextual
30+
31+
Do you trust the signer? Are they using your keys, their own, or a third-party authority? Just because something can be verified doesn’t mean you'll trust what it says.
32+
33+
✅ Signing is a Baseline, Not a Guarantee
34+
35+
Think of signing as the "tamper-evident seal". Useful, but only meaningful if the package was accurate, complete, and fresh when sealed.
36+
37+
🤔 The takeaway?
38+
39+
Signed SBOMs are better than unsigned ones. But we need complete, current, and verifiable SBOMs, ideally linked to build systems and verified by trusted parties.
40+
41+
💬👇 Would love to hear:
42+
43+
❓ How are you validating SBOM accuracy and provenance today?
44+
45+
❓ Does signing increase your trust?
46+
47+
❓ What else would increase your trust?
48+
49+
#SBOM #SoftwareSecurity #SupplyChainSecurity #DigitalSignatures #SecureDevelopment #DevSecOps #ApplicationSecurity #SoftwareIntegrity #CyberSecurity
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "🚨 SBOM Signing: The Myths That Are Putting You at Risk 🔥"
4+
date = "2025-06-15"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_sbom-softwaresecurity-supplychainsecurity-activity-7344065612274376704-7laa/"
6+
image = "img/thirdparty/2025-06-15-sbom-signing-myths.jpeg"
7+
+++
8+
9+
"If the SBOM exists, that's enough"
10+
11+
"We'll deal with signing later"
12+
13+
"Too complex to be worth it"
14+
15+
"We only need it for external releases"
16+
17+
"Open source doesn't need this"
18+
19+
👀 I've heard these all before. And they're not just wrong, but they're dangerous to believe.
20+
21+
Let's break them down:
22+
23+
❌ Myth #1: "If the SBOM exists, that's enough"
24+
25+
Just generating an SBOM isn't the endgame, it's the beginning.
26+
27+
An unsigned SBOM is an unauthenticated claim. Without signing, you're just hoping no one tampers with it.
28+
29+
❌ Myth #2: "We'll deal with signing later"
30+
31+
Delaying SBOM signing is like building a house and skipping the locks.
32+
33+
You might be safe for a while... until you're not.
34+
35+
❌ Myth #3: "Too complex to be worth it"
36+
37+
Key management, CI integration, and identity binding can be tricky but these are solvable problems.
38+
39+
If you're already sharing SBOMs for software transparency without integrity protections, complexity isn't your problem. You're prioritizing convenience over trust.
40+
41+
❌ Myth #4: "We only need it for external releases"
42+
43+
Insider threats. Supply chain drift. Misconfigured pipelines.
44+
45+
If you're not protecting internal artifacts, you're assuming your own house is clean. The riskiest threats aren't always outside, sometimes they come from within.
46+
47+
❌ Myth #5: "Open source doesn't need this"
48+
49+
Open source doesn't mean risk-free. Unsigned SBOMs leave the door wide open for supply chain attacks.
50+
51+
Signing puts a lock on that door.
52+
53+
💥 The truth?
54+
55+
If you're not signing your SBOMs, you're shipping unsigned claims about your software supply chain.
56+
57+
That's like selling a product with no warranty and claiming it's guaranteed.
58+
59+
🧠 It's time to treat SBOMs like first-class security artifacts.
60+
61+
And that means securing them by default.
62+
63+
💬👇 How do you handle SBOM signing today? What friction points have you hit - or solved?
64+
65+
#SBOM #SoftwareSecurity #SupplyChainSecurity #SBOMSigning #DigitalSignatures #PKI #OpenSourceSecurity #DevSecOps #CyberSecurity #SoftwareTransparency
399 KB
Loading
61.8 KB
Loading
40.8 KB
Loading

0 commit comments

Comments
 (0)