Skip to content

Commit 7e6554c

Browse files
authored
Merge pull request #11 from shiftleftcyber/jason
Adding another blog post, removing broken links
2 parents 72b5e1c + 09dd7e5 commit 7e6554c

3 files changed

Lines changed: 43 additions & 6 deletions

File tree

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "๐—ช๐—ต๐—ผ ๐—ฎ๐—ฐ๐˜๐˜‚๐—ฎ๐—น๐—น๐˜† ๐—ฏ๐˜‚๐—ถ๐—น๐—ฑ๐˜€ ๐—ฆ๐—•๐—ข๐— ๐˜€? ๐—”๐—ป๐—ฑ ๐˜„๐—ต๐—ผ ๐—ป๐—ฒ๐—ฒ๐—ฑ๐˜€ ๐˜๐—ต๐—ฒ๐—บ? ๐Ÿค”๐Ÿ”"
4+
date = "2025-05-18"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_sbom-supplychainsecurity-cybersecurity-activity-7323408174688980993-TPze"
6+
image = "img/thirdparty/sbom-creators-and-consumers.png"
7+
+++
8+
9+
SBOMs are a critical tool for understanding your software supply chain. But not everyone touches an SBOM the same way.
10+
11+
There are ๐—ฐ๐—ฟ๐—ฒ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€ and there are ๐—ฐ๐—ผ๐—ป๐˜€๐˜‚๐—บ๐—ฒ๐—ฟ๐˜€. Sometimes they're the same person, but often they're not.
12+
13+
๐Ÿ‘ฉ๐Ÿปโ€๐Ÿ’ป ๐—–๐—ฟ๐—ฒ๐—ฎ๐˜๐—ผ๐—ฟ๐˜€
14+
These folks generate SBOMs as part of the software build or packaging process:
15+
๐Ÿ’ป Development teams
16+
โš™๏ธ CI/CD pipelines
17+
๐Ÿ“ฆ Software vendors
18+
๐Ÿ› ๏ธ Tooling platforms
19+
20+
๐ŸŽฏ Their job: Ensure SBOMs are accurate, complete and reflect the actual software build artifacts.
21+
22+
๐Ÿ™‹๐Ÿปโ€โ™‚๏ธ ๐—–๐—ผ๐—ป๐˜€๐˜‚๐—บ๐—ฒ๐—ฟ๐˜€
23+
These folks use SBOMs to evaluate, verify, or monitor software:
24+
๐Ÿ›ก๏ธ Security analysts
25+
๐Ÿ“ฆ Software integrators
26+
โš–๏ธ Compliance teams
27+
๐Ÿ•ต๐Ÿปโ€โ™€๏ธ QA / SRE engineers
28+
๐Ÿ‘” Customers (especially enterprise/government)
29+
30+
๐ŸŽฏ Their job: Use SBOMs to assess risk, validate trust, and meet policy and/or regulatory requirements.
31+
32+
๐Ÿค“ ๐—›๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐˜„๐—ต๐—ฒ๐—ฟ๐—ฒ ๐—ถ๐˜ ๐—ด๐—ฒ๐˜๐˜€ ๐—ถ๐—ป๐˜๐—ฒ๐—ฟ๐—ฒ๐˜€๐˜๐—ถ๐—ป๐—ด...
33+
34+
If you're a ๐—ฐ๐—ฟ๐—ฒ๐—ฎ๐˜๐—ผ๐—ฟ, you're responsible for ๐˜๐—ฟ๐˜‚๐˜๐—ต.
35+
If you're a ๐—ฐ๐—ผ๐—ป๐˜€๐˜‚๐—บ๐—ฒ๐—ฟ, you're responsible for ๐˜๐—ฟ๐˜‚๐˜€๐˜.
36+
37+
This is why signing SBOMs and supporting cryptographic digital verification is critical. Without that, you might be consuming... misinformation? ๐Ÿคทโ€โ™‚๏ธ
38+
39+
SBOMs aren't just build-time artifacts. They are communication tools across the software lifecycle. ๐Ÿ’ป๐Ÿ”„
40+
41+
Are you generating SBOMs today? Or consuming them from vendors? Do you know if they are trustworthy? ๐Ÿค”
42+
43+
#SBOM #SupplyChainSecurity #CyberSecurity #SecureSoftware #OpenSourceSecurity #DevSecOps #DigitalTrust #SoftwareIntegrity #Compliance #SoftwareSupplyChain #BuildSecurityIn

โ€Žmarketing/content/securesbom.mdโ€Ž

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -115,9 +115,3 @@ Discuss enterprise features and custom solutions
115115
---
116116

117117
**Questions?** Our security experts are here to help. [Contact our team](/contactus/) to learn how SecureSBOM can transform your software supply chain security.
118-
119-
### Related Resources
120-
- ๐Ÿ“˜ [SBOM Signing Best Practices](/blog/sbom-signing-best-practices/)
121-
- ๐Ÿ” [Supply Chain Security Guide](/blog/supply-chain-security-guide/)
122-
- โš–๏ธ [EO 14028 Compliance Checklist](/blog/eo-14028-compliance/)
123-
- ๐Ÿ› ๏ธ [CI/CD Integration Examples](/blog/cicd-sbom-integration/)
512 KB
Loading

0 commit comments

Comments
ย (0)