Skip to content

Commit a7d2928

Browse files
authored
Merge pull request #30 from shiftleftcyber/2026-01-05-blogpost
Adding latest blog post
2 parents 160694c + d8c7b16 commit a7d2928

4 files changed

Lines changed: 67 additions & 1 deletion

File tree

marketing/.markdownlint.json

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"MD013": {
3+
"line_length": 120,
4+
"code_blocks": false
5+
},
6+
"MD033": {
7+
"allowed_elements": ["abbr"]
8+
}
9+
}
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
+++
2+
author = "Jason Smith"
3+
title = "Thoughts on ENISA's New SBOM Implementation Guide 🤔"
4+
date = "2026-01-05"
5+
linkedin = "https://www.linkedin.com/posts/j28smith_sbom-landscape-analysis-towards-an-implementation-activity-7414054620387393537-6hHA?utm_source=share&utm_medium=member_desktop&rcm=ACoAACKV2pcBRuHTsaPyNlOHthAchD5xLArHEmo"
6+
image = "img/thirdparty/2026-01-05-enisa-sbom-landscape-analysis.png"
7+
+++
8+
9+
I've been diving into the
10+
[<abbr title="European Union Agency for Cybersecurity">ENISA</abbr>](https://www.enisa.europa.eu/) recent Call for
11+
Feedback on their <abbr title="Software Bill of Materials">SBOM</abbr> Landscape Analysis: Towards an Implementation
12+
Guide.
13+
14+
It's refreshing to see a guide that prioritizes practicality over just theoretical compliance. While earlier frameworks
15+
from [<abbr title="Cybersecurity and Infrastructure Security Agency">CISA</abbr>](https://www.cisa.gov/) and
16+
[<abbr title="National Telecommunications and Information Administration">NTIA</abbr>](https://www.ntia.gov/) were vital
17+
for setting the baseline and minimum requirements, <abbr title="European Union Agency for Cybersecurity">ENISA</abbr> is
18+
taking us further into the "how-to" for real-world environments, especially for resource-constrained organizations.
19+
20+
My top highlights:
21+
22+
1️⃣ Practical "How-to": It provides structured implementation phases (Initiation, Planning, Execution, Monitoring &
23+
Controlling, and Closure) rather than just a list of required fields.
24+
25+
2️⃣ <abbr title="Software Bill of Materials">SBOM</abbr> Signing is Front and Center: It treats cryptographic signing as
26+
a core requirement (and not optional) for establishing software provenance and integrity.
27+
28+
3️⃣ Built-in <abbr title="Continuous Integration/Continuous Delivery">CI/CD</abbr> Integration with Examples: Includes
29+
specific automation hooks for GitHub Actions and GitLab <abbr title="Continuous Integration">CI</abbr> (using tools like
30+
Syft/Cosign) to ensure <abbr title="Software Bill of Materials">SBOMs</abbr> are generated and signed at the "Build-Time"
31+
stage when they are most accurate.
32+
33+
4️⃣ Focus on Quality: Provides a clear Completeness Assessment Framework with specific "Minimum vs. Excellence"
34+
thresholds (for example, aiming for 95%+ transitive dependency visibility). It also introduces a three-layered validation
35+
approach (Structural, Content, and Semantic) to ensure the data is accurate, not just present.
36+
37+
5️⃣ The "Validation Gate": Moves beyond just making an <abbr title="Software Bill of Materials">SBOM</abbr> to verifying
38+
it before deployment to include automated checks for digital signature verification, hash consistency, and timestamp
39+
verification to ensure signatures are still valid at the time of deployment.
40+
41+
Supply chain security is a team sport, and this guide provides the playbook we've been waiting for.
42+
43+
A couple of additional tools to call out that it didn't specifically include that I would recommend:
44+
45+
1️⃣ <abbr title="Software Bill of Materials">SBOM</abbr> Signing: SecureSBOM from ShiftLeftCyber
46+
🔗 [https://shiftleftcyber.io/securesbom/](https://shiftleftcyber.io/securesbom/)
47+
48+
2️⃣ <abbr title="Software Bill of Materials">SBOM</abbr> Quality: sbomqs from Interlynk
49+
🔗 [https://github.com/interlynk-io/sbomqs](https://github.com/interlynk-io/sbomqs)
50+
51+
Check out the draft and share your feedback with <abbr title="European Union Agency for Cybersecurity">ENISA</abbr> by
52+
January 23!
53+
54+
🔗 [https://www.enisa.europa.eu/news/call-for-feedback-advancing-software-supply-chain-security-together](https://www.enisa.europa.eu/news/call-for-feedback-advancing-software-supply-chain-security-together)
55+
56+
\#SBOM \#SupplyChainSecurity \#CyberSecurity \#ENISA \#SecureSBOM \#CyberResilienceAct \#CRA \#DevSecOps
57+
\#SupplyChainIntegrity \#SoftwareProvenance

marketing/hugo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ googleAnalytics = "G-CR0HB4HF2K"
1818

1919
[markup]
2020
[markup.goldmark]
21-
[markup.renderer]
21+
[markup.goldmark.renderer]
2222
unsafe = true
2323

2424
[params]
123 KB
Loading

0 commit comments

Comments
 (0)