Software bill of materials
A software bill of materials (software BOM) is a list of components in a piece of software. Software vendors often create products by assembling open source and commercial software components. The software BOM describes the components in a product. It is analogous to a list of ingredients on food packaging.
The concept of a BOM is well-established in traditional manufacturing as part of supply chain management. A manufacturer uses a BOM to track the parts it uses to create a product. If defects are later found in a specific part, the BOM makes it easy to locate affected products.
A software BOM is useful both to the builder (manufacturer) and the buyer (customer) of a software product. Builders often leverage available open source and third-party software components to create a product; a software BOM allows the builder to make sure those components are up to date and to respond quickly to new vulnerabilities. Buyers can use a software BOM to perform vulnerability or license analysis, both of which can be used to evaluate risk in a product. Many companies are using Microsoft Excel for BOM management, or their BOM software. Efficient prior to 2010 before online tools streamline the process, there are additional risks and issues using a spreadsheet.
The Cyber Supply Chain Management and Transparency Act of 2014 is pending[when?] US legislations that requires government agencies to obtain software BOMs for any new products they purchase. It also requires obtaining software BOMs for "any software, firmware, or product in use by the United States Government".
- "Securing A Mobile World" (PDF). Crosstalkonline.org. Retrieved 2015-06-12.
- "[Part 2] Code, Cars, and Congress: A Time for Cyber Supply Chain Management". Retrieved 2015-06-12.
- "Code, Cars, and Congress: A Time for Cyber Supply Chain Management". Retrieved 2015-06-12.
- "Software Bill of Materials improves Intellectual Property management". Embedded Computing Design. Retrieved 2015-06-12.
- "Using Excel for Bill of Materials (BOM) Management". Retrieved 2018-08-02.
- "Appropriate Software Security Control Types for Third Party Service and Product Providers" (PDF). Docs.ismgcorp.com. Retrieved 2015-06-12.
- "Top 10 2013-A9-Using Components with Known Vulnerabilities". Retrieved 2015-06-12.
- "Cyber-security risks in the supply chain" (PDF). Cert.gov.uk. Retrieved 2015-06-12.
- "H.R.5793 - 113th Congress (2013-2014): Cyber Supply Chain Management and Transparency Act of 2014 - Congress.gov - Library of Congress". Retrieved 2015-06-12.