An SBOM generated once and filed is not a security programme. It is a compliance document. The security value of an SBOM is in its continuous use: scanning new vulnerabilities against the current dependency inventory, detecting when dependencies change in ways that introduce new risk, verifying that the artefacts deployed to production match the artefacts produced from reviewed source code. All of this requires the SBOM to be integrated into the build pipeline, the vulnerability management process, and the deployment verification workflow — and to be maintained with every build rather than generated periodically as a compliance exercise.
Component 1
SBOM Generation & Pipeline Integration
The SBOM must be generated automatically at every build from the build artefacts themselves — not from the declared dependencies in package manifest files, which may not reflect what was actually resolved and included. Generation from artefacts (binary composition analysis) captures transitive dependencies that manifest files do not declare, detects discrepancies between declared and actual dependencies, and produces an SBOM that reflects the built product rather than the intended product.
Programme elements
SBOM tooling selection and integration: Syft, cdxgen, or Microsoft sbom-tool integrated into the CI/CD pipeline at the post-build stage
Format selection: CycloneDX 1.5 for security-focused use cases; SPDX 2.3 for licence compliance or when procurement contracts specify SPDX
SBOM depth specification: which layers of the dependency graph are included (direct only, transitive, all), calibrated to the organisation’s risk appetite and tooling capability
SBOM storage and versioning: every build’s SBOM stored alongside the build artefact with the same version identifier, enabling retrospective analysis of what was running at any point in time
Multi-language and multi-ecosystem coverage: Java, Python, JavaScript/Node, Go, Rust, .NET — each language ecosystem has different SBOM tooling requirements and coverage characteristics
Why artefact-based generation matters
A manifest-based SBOM lists the packages declared in package.json, pom.xml, or requirements.txt. An artefact-based SBOM lists what was actually resolved and bundled. These differ when: version ranges in manifests resolve to different versions than expected, peer dependencies resolve to transitive versions not in the manifest, bundling tools include additional packages, and in Go’s module graph where indirect dependencies are not in go.mod. The discrepancy between manifest and artefact is where supply chain attacks often live — precisely because the manifest is clean but the resolved artefact is not.
Component 2
Continuous Vulnerability Scanning
The SBOM is the input to a continuous vulnerability scanning process that checks every component in the inventory against multiple vulnerability databases. Scanning at build time alone is insufficient: vulnerabilities are published after builds complete, and the deployed version of an application may run for months between builds. Continuous scanning of the deployed SBOM against current vulnerability databases provides ongoing visibility into the exposure of running systems.
Programme elements
Vulnerability database coverage: NVD (National Vulnerability Database), OSV (Open Source Vulnerabilities), GitHub Advisory Database, and ecosystem-specific sources (npm Advisories, PyPA Advisory Database, RustSec)
Continuous scanning cadence: every SBOM in the inventory scanned against new CVE publications on a daily or near-real-time basis, not only at build time
Reachability analysis integration: for languages with reachability analysis tooling (Java, JavaScript), reducing false positives by verifying that the vulnerable function is in an execution path of the application before raising an alert
Severity-based SLA: alert routing and escalation path for each severity level, with defined remediation SLAs (critical: 24–72 hours, high: 7 days, medium: 30 days)
Operational age tracking: components that are significantly out of date relative to the latest available version, flagged for review even without a specific CVE — unmaintained components are inherently higher risk
The lag that continuous scanning addresses
Build-time scanning catches vulnerabilities that existed when the application was built. It does not catch vulnerabilities published after the build. An application built 3 months ago has had 3 months of CVE publications it was not scanned against. Without continuous scanning of deployed SBOMs, a CVE published today is not detected in running production systems until the next build — which may be days or weeks. For critical CVEs, that lag is the exploitation window.
Component 3
Provenance Verification & Artefact Signing
Knowing what components are in an application is necessary but not sufficient: you also need to know that each component is what it claims to be, that it was produced by the declared source, and that it has not been tampered with in transit. Artefact signing and provenance attestation provide cryptographic evidence that a build artefact was produced by a specific pipeline from a specific source at a specific time — making substitution attacks and binary tampering detectable rather than invisible.
Programme elements
Sigstore/cosign integration: cryptographic signing of build artefacts (container images, binaries, packages) with short-lived certificates via Fulcio, recorded in the Rekor transparency log
SLSA provenance attestation: generating and attaching SLSA provenance attestations to build artefacts, recording the source commit, build system, and build environment for each artefact
Signature verification in deployment pipeline: deployment workflows that verify artefact signatures and provenance attestations before deploying to any environment
Container image provenance: for containerised deployments, signing and verification of every container image and its constituent layers, with policy enforcement that refuses to deploy unsigned or unattested images
Key management for signing: signing key lifecycle management, rotation policy, and revocation procedure for compromised signing keys
Why signing alone is not sufficient
SolarWinds was signed. The signature verified that the package came from the SolarWinds signing key. The signing key had not been compromised. The build system had been compromised before signing. Artefact signing proves that the output of the build process is authentic — it does not prove that the build process itself was uncompromised. SLSA provenance attestation addresses this by also attesting the build system’s identity and integrity, not just signing the output.
Component 4
Dependency Governance & Policy Engine
Continuous SBOM generation and vulnerability scanning produce signals; a policy engine converts those signals into decisions. The dependency policy defines which packages are permitted, which are restricted, which are prohibited, and what conditions govern the use of each. The policy is enforced in the CI/CD pipeline: a build that introduces a prohibited dependency fails. A build that introduces a new dependency not yet reviewed is flagged for review before merging. A build that increases the severity of existing vulnerability findings above the threshold fails.
Programme elements
Dependency allow-list and block-list: approved packages list with version ranges, prohibited packages list (known malicious, abandoned, or licence-incompatible), and review-required list for packages not yet assessed
Licence compliance policy: automated detection of licence compatibility issues — GPL code in a commercial application, AGPL in a SaaS product, conflicting licence terms in combined dependencies
Dependency risk scoring: automated risk assessment of new dependencies added to the codebase, based on maintainer count, download count, OpenSSF Scorecard, CVE history, and last commit date
PR-level dependency review: automated comment on every pull request that adds or updates a dependency, surfacing the risk score, licence, maintainer health, and any existing CVEs before the PR is merged
Policy exception governance: documented process for approving exceptions to the dependency policy, with named approvers, review dates, and mandatory re-assessment triggers
The policy-as-code principle
Dependency policy documented in a policy document that no build system enforces provides guidance to developers who remember to read it. Dependency policy enforced in the CI/CD pipeline as code provides a gate that applies to every build regardless of whether any individual developer has read the policy. The policy document and the enforced policy will diverge over time unless both are maintained synchronously. The enforced policy in the pipeline is the authoritative policy; the documentation is the explanation of it.
Component 5
Secure Software Development Lifecycle (SSDLC) Integration
Supply chain security is most effective when integrated into the software development lifecycle rather than applied as a separate audit after the fact. SSDLC integration means that security checks happen at the point where changes are made — in the IDE, at PR review, at CI build, and at deployment — rather than in a periodic security assessment that finds issues after they have been in production. This requires tooling embedded in the development workflow and a development culture that treats dependency security as a first-class concern rather than a security team responsibility.
Programme elements
IDE security plugins: Dependabot alerts, Snyk IDE plugin, or equivalent giving developers immediate visibility into known vulnerabilities in the packages they are adding
Pre-commit hooks: client-side hooks that check for dependency policy violations before a commit reaches the remote repository, catching issues before they enter the review process
Automated dependency update PRs: Dependabot, Renovate, or equivalent that creates pull requests for dependency updates, keeping the dependency inventory current without requiring developers to manually monitor for updates
Security pipeline gates: defined quality gates in the CI/CD pipeline that fail the build when SBOM scanning finds critical or high CVEs, when new dependencies fail the policy check, or when provenance attestation is missing
Developer security training: specific to supply chain risk — how to evaluate a new dependency before adding it, what the risk signals are, and how to use the dependency review tooling
Component 6
Third-Party Supplier Security Assessment
The software supply chain extends to the commercial software and SaaS services the organisation purchases and integrates. These third parties have access to the organisation’s data and systems through their integrations, and their security posture directly affects the organisation’s exposure. The supplier assessment framework establishes the security requirements for third-party software, the assessment process for evaluating new suppliers, and the ongoing monitoring of existing suppliers’ security posture.
Programme elements
Supplier security requirements: minimum security standards for software vendors and SaaS providers, including SBOM availability, vulnerability disclosure policy, patch SLA commitments, and security certification requirements
SBOM collection from vendors: for commercially-licensed software, requiring vendors to provide SBOMs as part of procurement, enabling the organisation’s own vulnerability management to cover third-party software
Vendor security questionnaire and assessment: structured assessment of new software vendors’ supply chain security practices before procurement, with risk-tiered assessment depth based on integration scope and data access
Ongoing vendor monitoring: annual re-assessment for critical vendors, monitoring for vendor security incidents that may affect the organisation, contractual obligations for incident notification
Integration privilege review: periodic review of the permissions granted to every third-party integration, applying least privilege and removing permissions that are no longer needed
The integration privilege problem
Most SaaS integrations request the maximum permissions available and are granted them at implementation because it is easier than determining which permissions are actually needed. A marketing analytics tool with read access to the entire CRM, a code quality tool with read/write access to all repositories, a time tracking tool with access to calendar and email — each of these has permissions far exceeding the function it performs. When any of these services is compromised, the adversary inherits those permissions. Least-privilege integration review reduces the blast radius of supplier compromise without reducing functionality.
Component 7
Incident Response for Supply Chain Events
When a supply chain incident occurs — a widely-used dependency is found to contain malicious code, a vendor announces a breach of their CI/CD infrastructure, a new critical CVE is published for a component known to be widely deployed — the organisation must be able to answer two questions immediately: are we affected, and what do we do? Without an SBOM and a playbook, answering the first question takes days or weeks of manual inventory. With an SBOM and a playbook, it takes minutes.
Programme elements
Supply chain incident playbook: step-by-step response procedure for each incident type — malicious package discovered, vendor breach disclosed, critical CVE published, CI/CD compromise suspected
Rapid impact assessment: the process for querying the SBOM inventory to determine in under 30 minutes whether the organisation uses the affected component and in which systems
Emergency dependency replacement: process for replacing a compromised or critically vulnerable dependency with a safe alternative on an accelerated timeline, including the approvals required for emergency policy exceptions
Communication templates: internal stakeholder notification, vendor communication, and where required, regulatory notification templates for supply chain incidents affecting personal data
Post-incident review process: structured review to determine whether the incident was preventable with better supply chain controls, and to add the attack pattern to the monitoring programme
Component 8
SBOM Operationalisation, Observability & Executive Reporting
The SBOM only becomes strategically valuable when it is operationalised beyond security tooling into organisational visibility, decision-making, and governance. This component transforms SBOM data into measurable risk posture, operational telemetry, and executive-level reporting. It ensures that supply chain security is not confined to engineering teams but is visible, quantifiable, and actionable at every level of the organisation, from real-time operational dashboards to board-level risk oversight.
Programme elements
Central SBOM inventory platform: aggregation of all SBOMs across applications, environments, and business units into a unified, queryable system of record
Real-time exposure dashboards: live visualisation of vulnerability exposure, dependency risk distribution, and remediation status across the organisation
Risk quantification models: translating SBOM data into measurable risk metrics such as mean time to remediate (MTTR), exposure window duration, and dependency criticality scoring
Executive reporting cadence: structured reporting to leadership on supply chain risk posture, trends over time, and alignment against defined risk thresholds and regulatory expectations
Regulatory and audit integration: mapping SBOM controls and outputs to frameworks such as ISO 27001, NIST SSDF, and emerging software supply chain regulations, ensuring audit readiness
The visibility gap this closes
Most organisations generate SBOMs and perform scanning but fail to aggregate and interpret the data at scale. The result is fragmented visibility: individual teams may understand their own exposure, but the organisation as a whole cannot quantify systemic risk. Without centralised observability, leadership decisions are made without a clear understanding of software supply chain exposure. Operationalising SBOM data converts fragmented technical outputs into a unified risk intelligence layer, enabling prioritised remediation, defensible governance decisions, and demonstrable compliance under regulatory scrutiny.