.st0{fill:#FFFFFF;}

Show me your SBOM – Ep 472 

 August 23, 2024

By  Donna Grindle

In this episode, we’re diving deep into the world of Software Bill of Materials (SBOM)—basically, the recipe for your software, minus the secret sauce. If you’ve ever wondered what’s really under the hood of your favorite apps (or been caught off guard by a sneaky ingredient), this one’s for you. We’re breaking down why you should care about SBOMs, how they’re becoming a must-have in your vendor vetting process, and what it all means for the future of tech. Think of it as your crash course in making sure your software isn’t serving up any nasty surprises.

A 5 star review is all we ask from our listeners.
1x
Free HIPAA Training
Subscribe to the weekly email update from HMWH

I have read and agreed to your Privacy Policy

In this episode:

Show me your SBOM – Ep 472

Today’s Episode is brought to you by:

Kardon

and

HIPAA for MSPs with Security First IT

 Subscribe on Apple Podcast. Share us on Social Media. Rate us wherever you find the opportunity. 

Great idea! Share Help Me With HIPAA with one person this week!

Learn about offerings from the Kardon Club

and HIPAA for MSPs!

Thanks to our donors. We appreciate your support!

If you would like to donate to the cause you can do that at HelpMeWithHIPAA.com

Like us and leave a review on our Facebook page: www.Facebook.com/HelpMeWithHIPAA

If you see a couple of numbers on the left side you can click that and go directly to that part of the audio. Get the best of both worlds from the show notes to the audio and back!

Thanks to our donors.


Show me your SBOM

[03:29] This topic has mostly been discussed in relation to medical device vendors since it is now a requirement by the FDA that those vendors produce an SBOM. Things they “are a changin” as the song says. More software vendors should be producing these and more users should be asking them to show me your SBOM.

What is an SBOM?

Definition: An SBOM (Software Bill of Materials) is like a recipe for software, listing all the ingredients (components) that go into a software product. This includes libraries, modules, and other dependencies, whether they’re open-source or proprietary.

Analogy: Imagine you’re baking a cake. The SBOM is like the ingredient list that tells you what’s in the cake — sugar, flour, eggs, etc. Knowing these ingredients is crucial for things like identifying allergens (or in the case of software, vulnerabilities).

Key Concerns: Right off the bat, there’s a concern that an SBOM might give hackers a roadmap to exploit software by exposing its components. However, the transparency it provides to defenders (like knowing if you have outdated or vulnerable components) far outweighs this risk​​​​. There are other issues people worry about as well. We will touch on those in a moment.

Types of Software Bill of Materials (SBOM) Documents

SBOM FAQ

Software Transparency in SaaS Environments

Why would I want to see an SBOM?

[10:00]

Benefits for All Involved:

  • For Consumers: SBOMs help you identify if the software you use has known vulnerabilities by showing all the components used. This is vital in vetting vendors and understanding your risk exposure, especially during incidents like the Log4j vulnerability​​​​.
  • For Authors (Developers): SBOMs help in maintaining software by keeping track of all components and their versions, which is essential for managing updates and security patches.
  • For Distributors: SBOMs provide a clear chain of custody for software components, making it easier to ensure that everything is up to standard and compliant with regulations​​.

Hierarchical Relationships: SBOMs can show you the dependency tree — how one component depends on others, which helps in understanding the full scope of potential vulnerabilities and the impacts of updates​​​​.

Licensing and Asset Management: SBOMs also aid in managing software licenses, ensuring compliance, and avoiding legal pitfalls​​.

How do you use an SBOM?

[15:15]

Creation and Tools:

  • Creating SBOMs: SBOMs can be generated at different stages of the software lifecycle, such as during design, build, or deployment. Various tools like software composition analysis tools help in generating SBOMs​​​​.
  • Using Standards: OWASP’s CycloneDX and other standards are being developed to help distribute and consume SBOMs more effectively. These tools and standards make it easier for different organizations to share and use SBOM data​​​​. The OWASP formats help illustrate the different types of SBOMs that could be used:
    • Software Bill of Materials (SBOM)
    • Software-as-a-Service Bill of Materials (SaaSBOM)
    • Hardware Bill of Materials (HBOM)
    • Operations Bill of Materials (OBOM)
    • Vulnerability Disclosure Reports (VDR)
    • Vulnerability Exploitability eXchange (VEX)

Practical Examples: Think of SBOMs as documents that are passed along from the software creator to the end-user, and possibly through intermediaries (distributors). These documents ensure that everyone in the chain knows what’s inside the software, how it was made, and if it’s safe to use​​.

How to create an SBOM, with example and template | TechTarget

SBOM Sharing Primer

Software Bill of Materials (SBOM) Sharing Lifecycle Report

OWASP CycloneDX

OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reduction. The specification supports:

  • Software Bill of Materials (SBOM)
  • Software-as-a-Service Bill of Materials (SaaSBOM)
  • Hardware Bill of Materials (HBOM)
  • Operations Bill of Materials (OBOM)
  • Vulnerability Disclosure Reports (VDR)
  • Vulnerability Exploitability eXchange (VEX)

SPDX

Software Identification (SWID) Tagging | CSRC

[21:23]

There are some concerns how they will be used beyond just hackers, though.

  1. Intellectual Property Exposure:
    • Concern: Companies may worry that an SBOM might expose their intellectual property by revealing the proprietary components and dependencies they use in their software. This could give competitors insights into their technology stack or strategies.
    • Response: While an SBOM does list components, it typically does not expose the proprietary source code itself. The list of ingredients doesn’t reveal the secret recipe — just the components used, which often are open-source or third-party modules with pre-existing licenses that require disclosure anyway​​.
  2. Licensing and Legal Risks:
    • Concern: Some organizations fear that SBOMs could increase their exposure to licensing violations by making it easier for auditors or legal entities to spot unlicensed or improperly licensed components.
    • Response: SBOMs actually help mitigate these risks by providing clear documentation of all components and their licenses, making it easier to ensure compliance and address any issues proactively before they become legal problems​​.
  3. Operational Overhead:
    • Concern: There’s a perception that creating and maintaining SBOMs could add significant overhead to development and operational processes, particularly for organizations with complex software products that have many dependencies.
    • Response: While there is some overhead, the benefits often outweigh the costs. Automated tools can simplify the generation and maintenance of SBOMs, and the increased visibility can lead to more efficient management of software assets, ultimately reducing long-term operational costs​​.
  4. Dynamic and Runtime Components:
    • Concern: Some components of software, particularly those loaded dynamically at runtime, might not be captured in a static SBOM, leading to incomplete documentation.
    • Response: To address this, organizations can complement static SBOMs with runtime analysis tools that capture dynamically loaded components. This ensures a more comprehensive understanding of the software’s operational environment​​.
  5. Security of SBOM Data:
    • Concern: The SBOM itself could become a target for attackers if not properly secured, as it contains sensitive information about the software’s composition.
    • Response: It’s crucial to implement proper access controls and security measures for SBOMs, just like any other sensitive data. This includes limiting access to the SBOM to only those who need it and ensuring that it’s transmitted and stored securely​​.

These concerns are important to acknowledge, but they also present opportunities for improving software security and operational efficiency. By addressing these concerns head-on, organizations can leverage SBOMs to enhance their security posture rather than view them as a potential risk.

Get your SBOM going

[30:25] If you create, support or use any kind of technology systems you need to understand this concept is getting started but it is picking up steam. Start to get educated now. Begin to sort out how you would use them in your environment. I expect to start seeing vetting questionnaires asking for them. It won’t be a deal breaker to not have one but you will certainly show you are ahead of the curve if you have anything along these lines!

Along with the links included above here are some more including a CISA event that you may find interesting.

SBOM-a-Rama Fall 2024 | CISA

The ultimate guide to SBOMs

If your software was a dish, wouldn’t you want to know every ingredient before taking a bite — especially if it could leave you with more than just a bad taste? Keeping tabs on your software’s components boils down to understanding and leveraging your SBOMs effectively. Whether you’re vetting vendors or safeguarding your own systems, it’s crucial to get a grip on what’s under the hood. So, start asking those hard questions about SBOM processes, educate your team, and don’t get caught off guard when cyber threats come knocking.

Remember to follow us and share us on your favorite social media site. Rate us on your podcasting apps, we need your help to keep spreading the word. As always, send in your questions and ideas!

HIPAA is not about compliance,

it’s about patient care.TM

Special thanks to our sponsors Security First IT and Kardon.

HelpMeWithHIPAA.com Is A
Collaborative Project

Created & Sponsored By: