[ISM] Software bill of materials:

A software bill of materials is produced and made available to consumers of software.

[SSDF] Safeguard provenance data for transparency (SSS-03-01-02)

Collect and safeguard detailed provenance data for each component within a software release, maintaining it in a software bill of materials (SBOM) that can be shared with software acquirers and operations teams. Protect the SBOM’s integrity to ensure accurate traceability and update it as components change over time. This enables consumers to understand the origins and dependencies of each software component, supporting secure and transparent software usage.

[S2C2F] Generate and maintain SBOMs for rebuilt OSS (SSS-03-01-02-01)

Establish processes to generate comprehensive SBOMs for all open-source software (OSS) components that are rebuilt as part of your software supply chain. Each SBOM should capture detailed provenance data, including the origins, dependencies, and versions of each package, ensuring alignment with auditability requirements. Maintain the integrity of the SBOMs to provide accurate traceability for software users and stakeholders, facilitating dependency management and transparency. Update SBOMs as components evolve or dependencies change, enabling organizations to assess the blast radius of potential vulnerabilities or issues. Share SBOMs securely with authorized acquirers or operators to enhance the overall security and reliability of the software supply chain.

Operations

ID Operation Description Phase Agent
SSS-03-01-02-01-01 Identify and document rebuilt OSS components Catalog all open-source software (OSS) components you rebuild, including their versions, dependencies, and sources. Preparation Development teams, Security team
SSS-03-01-02-01-02 Use tools to generate SBOMs Leverage Software Bill of Materials (SBOM) generation tools to capture detailed supply chain metadata for each rebuilt package. Development DevOps team, Security team
SSS-03-01-02-01-03 Incorporate SBOM generation into CI/CD pipelines Automate the generation of SBOMs during the build process to ensure that every rebuilt OSS component is accompanied by its SBOM. Development DevOps team, Build engineers
SSS-03-01-02-01-04 Store SBOMs in a central repository Maintain a centralized repository for storing and managing SBOMs, ensuring easy access for audits, compliance, and vulnerability tracking. Deployment Security team, Compliance team
SSS-03-01-02-01-05 Leverage SBOMs for risk assessment and audit Use SBOMs to assess the blast radius of vulnerabilities and ensure traceability and compliance for regulatory or audit requirements. Post-deployment Security team, Risk management team

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1730)
NIST Secure Software Development Framework (PS.3.2)
S2C2F: Secure Supply Chain Consumption Framework (REB-3)