C0c0n Shiny Sbom

c0c0n 2024 Goa, India
1 / 35
Slide 1 of C0c0n Shiny Sbom
Slide 2 of C0c0n Shiny Sbom
Slide 3 of C0c0n Shiny Sbom
Slide 4 of C0c0n Shiny Sbom
Slide 5 of C0c0n Shiny Sbom
Slide 6 of C0c0n Shiny Sbom
Slide 7 of C0c0n Shiny Sbom
Slide 8 of C0c0n Shiny Sbom
Slide 9 of C0c0n Shiny Sbom
Slide 10 of C0c0n Shiny Sbom
Slide 11 of C0c0n Shiny Sbom
Slide 12 of C0c0n Shiny Sbom
Slide 13 of C0c0n Shiny Sbom
Slide 14 of C0c0n Shiny Sbom
Slide 15 of C0c0n Shiny Sbom
Slide 16 of C0c0n Shiny Sbom
Slide 17 of C0c0n Shiny Sbom
Slide 18 of C0c0n Shiny Sbom
Slide 19 of C0c0n Shiny Sbom
Slide 20 of C0c0n Shiny Sbom
Slide 21 of C0c0n Shiny Sbom
Slide 22 of C0c0n Shiny Sbom
Slide 23 of C0c0n Shiny Sbom
Slide 24 of C0c0n Shiny Sbom
Slide 25 of C0c0n Shiny Sbom
Slide 26 of C0c0n Shiny Sbom
Slide 27 of C0c0n Shiny Sbom
Slide 28 of C0c0n Shiny Sbom
Slide 29 of C0c0n Shiny Sbom
Slide 30 of C0c0n Shiny Sbom
Slide 31 of C0c0n Shiny Sbom
Slide 32 of C0c0n Shiny Sbom
Slide 33 of C0c0n Shiny Sbom
Slide 34 of C0c0n Shiny Sbom
Slide 35 of C0c0n Shiny Sbom

Abstract

Addresses what organizations should actually do with SBOMs after generation, covering distribution, verification, quality checking, policy enforcement, and cross-functional value beyond security.

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation at C0c0n 2024 builds on the SBoM narrative, asking the practical question: now that organizations have generated their “shiny” Software Bill of Materials, what should they actually do with it? Anant Shrivastava maps the SBoM journey from generation through distribution, verification, and consumption, introduces the different stakeholder roles (library authors, producers, consumers, end users), and showcases a growing ecosystem of consolidated SBoM tooling — culminating in a live demonstration of SBoM Play, an open-source tool for extracting actionable intelligence from SBoMs.

Key Topics Covered

The SBoM Journey Stages:

  • Generation: Creating the SBoM using tools like cdxgen, SPDX Generator, or GitHub dependency graph exports
  • Distribution: Sharing SBoMs with downstream consumers and partners
  • Verification: Validating SBoM accuracy and quality
  • Consumption: Actually using SBoM data to drive decisions — the least mature stage and the focus of this talk

Catalyzing Events and Regulatory Landscape:

  • Key incidents (SolarWinds, CodeCov, Colonial Pipeline) led to the US Executive Order, NIST SSDF Framework, and Google’s SLSA
  • India’s CERT-In issued SBoM guidelines in 2024, expanding the mandate beyond US-centric requirements
  • Three competing standards persist: SPDX (ISO, GitHub default), CycloneDX (OWASP, now also ISO), and SWID

SBoM Stakeholder Roles:

  • Library authors produce base functionality SBoMs
  • Producers (product companies) both consume upstream SBoMs and produce their own
  • End users/consumers can only leverage the product — limited to upgrade or hold decisions

Industry Skepticism and Systemic Challenges:

  • Organizations question why they should disclose composition, restrict sharing to NDA-covered entities, or dismiss SBoM because they don’t sell to the US
  • The software industry is largely fixing problems it created: faster release cycles reduce dependency upgrade incentives, OSS maintainers are under-supported, and automated vulnerability notifications create alert fatigue

Consolidated SBoM Tooling Ecosystem:

  • Format-agnostic tools: bomctl for cross-format SBoM manipulation
  • Policy-driven security: Vet by SafeDep for dependency vetting
  • Quality assessment: sbomqs by Interlynk and sbom-status by ServiceNow
  • SBoM merging: sbomasm by Interlynk for combining multiple SBoMs
  • End-of-life detection: xeol for identifying EOL components
  • Scoring: eBay’s sbom-scorecard for SBoM quality rating

SBoM Usage Beyond Security Teams:

  • For developers: manage technical debt, reduce dependency scatter, consolidate library usage, simplify package selection for new projects
  • For M&A: assess acquisition costs via outdated/EOL software indicators, evaluate tech stack alignment and team cohesion
  • For compliance: track licensing at component level, identify GPL and other restriction risks
  • For risk management: quantify vendor software risk, evaluate SSO token exposure, make environment-aware risk decisions

Key Analytical Concepts:

  • EOL code detection across the dependency tree
  • Package drift identification between environments or versions
  • License violation scanning at transitive dependency levels
  • OpenSSF Scorecard integration for open-source health assessment

SBoM Play Tool:

  • Open-source tool at github.com/cyfinoid/sbomplay for practical SBoM exploration
  • Downloads organization-level SBoMs, stores in SQLite, and generates reports
  • Demonstrates that working with SBoMs is technically straightforward — the hard part is quantifying the monetary value

Actionable Takeaways

  1. Move beyond SBoM generation to focus on the consumption and analysis stage — generating SBoMs without a usage strategy delivers minimal value.
  2. Adopt format-agnostic tooling like bomctl to avoid vendor lock-in to a single SBoM standard and enable cross-format workflows.
  3. Implement SBoM quality checks using tools like sbomqs or sbom-scorecard before relying on SBoM data for security decisions.
  4. Use SBoM Play or similar consolidated analysis tools to extract business intelligence from SBoMs — including dependency drift, EOL components, and license violations.
  5. Quantify SBoM value in monetary terms by calculating the cost impact of library changes, package upgrades, code rewrites, and distribution — this is the key to organizational buy-in.
  6. Produce outputs in business-friendly formats (PDF, HTML, Excel) rather than CLI-only pipelines to make SBoM insights accessible to non-technical stakeholders.

Resources

Embed This Presentation

See Also

supply-chain sbom