Requirements are cascading down to government organizations, standards bodies, and commercial compliance regimes
NIST
NIST SP 800-161: Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations
"This publication provides guidance to organizations on identifying, assessing, and mitigating cybersecurity risks throughout the supply chain at all levels of their organizations. The publication integrates cybersecurity supply chain risk management (C-SCRM) into risk management activities"
Read the document
Federal Drug Administration
FDA-2021-D-1158: Cybersecurity in Medical Devices
"4. a. Software Bill of Materials
Because vulnerability management is a critical part of a device’s security risk management processes, an SBOM or an equivalent capability should be maintained as part of the device’s configuration management, be regularly updated to reflect any changes to the software"
Read the document
Federal Drug Administration
FDA-2023-D-1030: Cybersecurity in Medical Devices: Refuse to Accept Policy for Cyber Devices and Related Systems
"A person who submits an application [...] meets the definition of a cyber device under this section shall include such information as [FDA] may require to ensure that such cyber device meets the cybersecurity requirements under subsection (b).
(3) provide to the Secretary a software bill of materials, including commercial, open-source, and off-the-shelf software components"
Read the document
Office of Management and Budget
M-22-18: Enhancing the Security of the Software Supply Chain through Secure Software Development Practices
"2.b SBOMs must be generated in one of the data formats defined in the National Telecommunications and Information Administration (NTIA) report “The Minimum Elements for a Software Bill of Materials (SBOM)”
Read the memorandum
PCI DSS v4
Requirement 6: Develop and Maintain Secure Systems and Software
"6.3.2. An inventory of bespoke and custom software, and third-party software components incorporated into bespoke and custom software is maintained to facilitate vulnerability and patch management."
Read the document