docs: add SBOM to assess
This commit is contained in:
committed by
Stefan Rotsch
parent
be41a7d98c
commit
ac5f63076e
25
radar/2023-09-01/sbom.md
Normal file
25
radar/2023-09-01/sbom.md
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
---
|
||||||
|
title: "Software Bill of Materials (SBOM)"
|
||||||
|
ring: assess
|
||||||
|
quadrant: platforms-and-aoe-services
|
||||||
|
tags: [devops, security]
|
||||||
|
---
|
||||||
|
|
||||||
|
A Software Bill of Materials (SBOM) is an artifact that consolidates information about the dependencies of a software.
|
||||||
|
|
||||||
|
Multiple standards that define the contents and format of SBOMs exist.
|
||||||
|
The most prominent open-source formats include:
|
||||||
|
|
||||||
|
- [CycloneDX](https://cyclonedx.org/) (OWASP): designed in 2017 with the goal to identify vulnerabilities in the software supply chain.
|
||||||
|
- [SPDX](https://spdx.dev/) (Linux Foundation): mainly focused on license compliance in the context of open source software. Support for tracking security vulnerabilities has been added in 2016 with SPDX 2.1.
|
||||||
|
|
||||||
|
While the goals of these SBOM formats vary, they both support
|
||||||
|
|
||||||
|
- automated generation of SBOMs from source code and
|
||||||
|
- machine-readable output to enable automated processing of SBOMs.
|
||||||
|
|
||||||
|
We see potential for SBOMs to improve software supply chain security by facilitating
|
||||||
|
|
||||||
|
- transparency regarding direct and transitive software dependencies,
|
||||||
|
- automated detection of software dependencies with known vulnerabilities and
|
||||||
|
- interoperability of security tools that support the same SBOM standards.
|
||||||
Reference in New Issue
Block a user