Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SBOM

Mend API Helps Make SBOMs Simple

The proliferation of third-party software components such as open source software(OSS) has triggered a growing need to keep track of it all. Why? Because when security vulnerabilities inevitably crop up in open source components, it’s pretty important to know whether your company uses that piece of code – or whether it appears in the myriad software dependencies inherent in open source.

AppSec Decoded: Methods and tools for SBOM generation | Synopsys

President Biden’s executive order calls for agencies to buy only software products that have a software Bill of Materials (SBOM). Mike McGuire, security solutions manager at Synopsys, and Taylor Armerding, security advocate at Synopsys, discuss the role SBOMs will play in application security and what tools and methods organizations can leverage to create a comprehensive SBOM.

RKVST (Jitsuin) SCITT Demo from 2019

Supply Chain Integrity, Transparency, and Trust... all in one platform. A little throw-back here...all the way to 2019! SCITT is a hot area right now in 2022 but this is what we've been doing since the beginning. We were even still called Jitsuin :-) This is a very quick run through how making supply chain evidence available to all authorised partners in a supply chain as quickly as possible with Provenance, Governance, and Immutability guarantees can boost trust, reduce risk, and speed operations.

What is SCITT and how does RKVST help?

SCITT in the information security context stands for “Supply Chain Integrity, Transparency, and Trust”. It’s a relatively young discipline and the dust is still settling over its scope and definition but the core is very simple: risk vests in the operator of equipment, but it originates at every point in the supply chain.

rusted SBOMs delivered with the JFrog Platform and Azure

SBOMs provide essential visibility into all the components that make up a piece of software and detail how it was put together. With an SBOM in hand it’s possible to determine if software contains existing security and compliance issues or is impacted by newly discovered vulnerabilities. The SBOM is imperative due to the White House’s cybersecurity executive order from May 2021 requiring them for all government software purchases and many private organizations following suit.

(SBOM) Creation of your Software Bill of Materials

Because of growing software supply chain cyber-attacks and incidents like Log4J, tracking your Software Bill of Materials has become essential. It’s a list of the “ingredients” that make up a piece of software. SBOMs are used by software producers to manage components, software buyers to assess security and compliance, and operators to monitor risks and threats. SBOMs are required by military, and government agencies and will likely become the norm, especially in highly regulated industries. Documenting and reporting your SBOM will become a universal best practice.

Generating an SBOM is just the tip of the iceberg

It has been nearly a year since the President Biden’s Executive Order 14028 catapulted Software Bills of Materials (SBOMs) from niche topic to the forefront of efforts to improve security of cyber supply chains. Since then not only have federal agencies including NIST and CISA delivered significant amounts of guidance and insight, but SBOMs have been the subject of intense debate across developer communities and beyond.