š—Ŗš—µš—¼ š—®š—°š˜š˜‚š—®š—¹š—¹š˜† š—Æš˜‚š—¶š—¹š—±š˜€ š—¦š—•š—¢š— š˜€? š—”š—»š—± š˜„š—µš—¼ š—»š—²š—²š—±š˜€ š˜š—µš—²š—ŗ? šŸ¤”šŸ”

2025-05-18

Jason Smith

SBOMs are a critical tool for understanding your software supply chain. But not everyone touches an SBOM the same way.

There are š—°š—æš—²š—®š˜š—¼š—æš˜€ and there are š—°š—¼š—»š˜€š˜‚š—ŗš—²š—æš˜€. Sometimes they’re the same person, but often they’re not.

šŸ‘©šŸ»ā€šŸ’» š—–š—æš—²š—®š˜š—¼š—æš˜€

These folks generate SBOMs as part of the software build or packaging process:

  • šŸ’» Development teams
  • āš™ļø CI/CD pipelines
  • šŸ“¦ Software vendors
  • šŸ› ļø Tooling platforms

šŸŽÆ Their job: Ensure SBOMs are accurate, complete and reflect the actual software build artifacts.

šŸ™‹šŸ»ā€ā™‚ļø š—–š—¼š—»š˜€š˜‚š—ŗš—²š—æš˜€

These folks use SBOMs to evaluate, verify, or monitor software:

  • šŸ›”ļø Security analysts
  • šŸ“¦ Software integrators
  • āš–ļø Compliance teams
  • šŸ•µšŸ»ā€ā™€ļø QA / SRE engineers
  • šŸ‘” Customers (especially enterprise/government)

šŸŽÆ Their job: Use SBOMs to assess risk, validate trust, and meet policy and/or regulatory requirements.

šŸ¤“ š—›š—²š—æš—²ā€™š˜€ š˜„š—µš—²š—æš—² š—¶š˜ š—“š—²š˜š˜€ š—¶š—»š˜š—²š—æš—²š˜€š˜š—¶š—»š—“…

If you’re a š—°š—æš—²š—®š˜š—¼š—æ, you’re responsible for š˜š—æš˜‚š˜š—µ.

If you’re a š—°š—¼š—»š˜€š˜‚š—ŗš—²š—æ, you’re responsible for š˜š—æš˜‚š˜€š˜.

This is why signing SBOMs and supporting cryptographic digital verification is critical. Without that, you might be consuming… misinformation? šŸ¤·ā€ā™‚ļø

SBOMs aren’t just build-time artifacts. They are communication tools across the software lifecycle. šŸ’»šŸ”„

Are you generating SBOMs today? Or consuming them from vendors? Do you know if they are trustworthy? šŸ¤”

#SBOM #SupplyChainSecurity #CyberSecurity #SecureSoftware #OpenSourceSecurity #DevSecOps #DigitalTrust #SoftwareIntegrity #Compliance #SoftwareSupplyChain #BuildSecurityIn

This post was originally published on LinkedIn. To join the conversation and leave a comment, please visit the original post here.