Neutralize Your Software Supply Chain From Cyber Attacks - SBOM Security Explained
Learn how Software Bill of Materials (SBOM) helps you identify vulnerabilities, meet compliance requirements, and secure your software supply chain.
THNKBIG Team
Engineering Insights
Attackers have realized that compromising one upstream dependency is more efficient than attacking thousands of organizations directly. SBOMs (Software Bills of Materials) are the foundation of defending against this approach. This guide explains what SBOMs are, why they matter, and how to implement them in your Kubernetes delivery pipeline.
What Is an SBOM?
A Software Bill of Materials (SBOM) is a formal, machine-readable inventory of every component in a software artifact. Like a nutrition label on food packaging, an SBOM tells you exactly what's inside: every library, every dependency, and their exact versions — including transitive dependencies you didn't explicitly add.
SBOM standards: SPDX (ISO/IEC 5962:2021, Linux Foundation) and CycloneDX (OWASP). CycloneDX is widely adopted for security use cases and better supported by Kubernetes-native tooling. Both are open source — choose based on your toolchain compatibility.
Why SBOMs Are Now Required
Executive Order 14028 (May 2021) required federal agencies to obtain SBOMs from software vendors. CISA published minimum SBOM requirements. FedRAMP authorization now expects SBOM-based supply chain risk management. For organizations in regulated industries, SBOM generation is becoming a baseline compliance requirement.
The Threats SBOMs Help You Detect
- Known CVE exposure — scan your SBOM against NVD and OSV databases to identify vulnerable components
- License compliance violations — detect copyleft licenses (GPL) that conflict with commercial use
- Abandoned dependencies — identify components with no recent maintenance or archived repositories
- Typosquatting — catch packages that don't match your expected dependency manifest
Generating SBOMs for Container Images
Syft is the most widely used open-source SBOM generator for container images. Integrate it into your CI/CD pipeline after the image build step:
- Generate SBOM: syft registry/image:tag -o spdx-json > sbom.spdx.json
- Scan against CVEs: grype sbom:sbom.spdx.json
- Attest to image: cosign attest --predicate sbom.spdx.json --type spdx registry/image:tag
Enforcing SBOM Policies in Kubernetes
Kyverno admission policies can verify that a Cosign-attested SBOM exists for any image before scheduling the pod. This ensures no image enters your cluster without a verified, signed provenance record. Complete pipeline flow: SBOM generated in CI → Scanned for critical CVEs (fail build if found) → Attached to image via Cosign attest → Kyverno verifies attestation at admission → SBOM archived in DependencyTrack for ongoing monitoring.
SBOM Implementation with THNKBIG
THNKBIG implements SBOM generation and enforcement pipelines for Kubernetes environments. Whether you need to satisfy EO 14028, FedRAMP supply chain controls, or simply want better dependency risk visibility, our team can design and implement a complete SBOM program. Contact us to start your software supply chain security assessment.
Executive Summary: Why SBOMs Matter Now
Log4Shell exposed a fundamental visibility gap: most organizations could not quickly answer, "Where are we using Log4j, and which versions?" Those without Software Bills of Materials (SBOMs) spent days manually auditing codebases and containers; those with current SBOMs queried a component database and had an accurate impact list within hours. That time delta directly translated into a larger or smaller exposure window.
SBOMs are now a practical necessity, not a niche best practice—especially for any organization building software for the US federal government under Executive Order 14028.
What Is a Software Bill of Materials (SBOM)?
A Software Bill of Materials is a machine-readable, hierarchical inventory of all components that make up a software artifact:
- Open-source libraries
- Third-party components
- Proprietary modules
- Transitive dependencies (dependencies of dependencies)
Think of it as an ingredients label for software, including exact versions. For containerized workloads, a complete SBOM covers:
- Base image OS packages
- Language/runtime packages (npm, pip, Maven, Go modules, etc.)
- Compiled binaries and their linked dependencies
- All transitive dependencies
Two dominant standards are used:
- SPDX (Software Package Data Exchange) — ISO/IEC 5962:2021
- CycloneDX — OWASP-maintained, widely supported across CI/CD ecosystems
Why Log4Shell Changed the Conversation
Log4Shell (CVE-2021-44228) was a critical RCE vulnerability in Log4j, a ubiquitous Java logging library. The technical severity was high, but the real crisis was lack of inventory:
- Without SBOMs: Organizations had to manually inspect repositories, build configs, and container images to find Log4j usage. For large environments, this took days.
- With SBOMs: Security teams queried their SBOM database for
log4jand specific vulnerable versions, producing a complete list of affected services in hours.
This pattern repeats for every major dependency vulnerability. SBOMs don’t eliminate vulnerabilities; they compress the time from disclosure to remediation by making impact analysis deterministic.
Software Supply Chain Security in Context
Software supply chain security is about securing every step from code to production:
- Source code integrity — signed commits, branch protection, code review
- Dependencies — tracking and assessing vulnerabilities in all components
- Build systems — securing CI/CD infrastructure and configurations
- Container images — knowing exactly what’s inside each image
- Deployment pipelines — controlling who/what can promote artifacts to production
Modern software is assembled from open-source libraries, vendor components, proprietary code, and external APIs. Each is a potential attack vector. Supply chain security starts with visibility—SBOMs—and extends to verification and enforcement.
How to Generate and Operationalize SBOMs
1. Generate SBOMs at Build Time
SBOMs should be produced automatically in CI/CD, not via ad-hoc scripts. Common tools:
| Tool | Formats | Best For |
|------|---------|----------|
| Syft (Anchore) | SPDX, CycloneDX | Container images, filesystems, directories |
| Trivy | SPDX, CycloneDX | Images + concurrent vulnerability scanning |
| Docker Scout | CycloneDX | Docker-native workflows, Docker Hub integration |
| SPDX SBOM Generator | SPDX | Language-specific package ecosystems |
| CycloneDX CLI | CycloneDX | Multi-language, multi-ecosystem support |
Integrate these into your pipelines so every build produces an SBOM artifact.
2. Store SBOMs with the Artifact
Attach or store SBOMs alongside the images or packages they describe (e.g., in your container registry or artifact repository). This ensures:
- Version alignment between deployed artifact and SBOM
- Easy lookup during incident response and audits
3. Sign Images and SBOMs
Use Sigstore Cosign to cryptographically sign both:
- The container image (or artifact)
- The corresponding SBOM
This establishes a verifiable chain of custody: you can prove that what’s running in production is exactly what was built and analyzed.
4. Enforce SBOM Presence at Admission
Use Kubernetes admission controllers such as Kyverno or OPA Gatekeeper to enforce policies like:
- Reject images without an attached SBOM
- Reject images or SBOMs without valid Cosign signatures
This turns SBOMs from a passive document into an active gatekeeping control: artifacts without provenance and inventory cannot reach production.
Incident Response with SBOMs
When a new CVE is disclosed:
- Ingest the advisory (CVE, vendor bulletin, etc.).
- Query SBOM data for the affected package name and version range.
- Identify impacted services and environments.
- Prioritize based on severity, exploitability, and business criticality.
- Patch and rebuild affected components, then redeploy.
- Verify via new SBOMs that vulnerable versions are no longer present.
Without SBOMs, step 2 becomes a manual audit of every codebase and image, turning a targeted response into a multi-day scramble.
Compliance and Regulatory Drivers
SBOMs are increasingly embedded in regulatory and audit expectations:
- US Government / FedRAMP — Executive Order 14028 mandates SBOMs for software sold to federal agencies.
- HIPAA / HITRUST — SBOMs support demonstrable software risk management and third-party component oversight.
- SOC 2 — Auditors are asking for evidence of dependency tracking and vulnerability management; SBOMs provide concrete artifacts.
- PCI-DSS — Automated SBOM generation and scanning help satisfy requirements around component inventory and vulnerability management.
Even outside regulated sectors, customers and partners are starting to treat SBOMs as a baseline due diligence item.
Key Takeaways
- SBOMs provide complete component visibility, enabling rapid, deterministic response to new vulnerabilities.
- Executive Order 14028 is accelerating SBOM adoption across the software ecosystem, especially for vendors serving US federal agencies.
- Automated SBOM generation, signing, and enforcement (e.g., Syft/Trivy/Docker Scout + Cosign + Kyverno/OPA) should be standard in modern CI/CD pipelines.
- SBOMs don’t prevent vulnerabilities, but they dramatically reduce the time and uncertainty involved in assessing and remediating impact.
How THNKBIG Can Help
THNKBIG’s cybersecurity practice designs and implements end-to-end software supply chain security programs, including:
- Automated SBOM generation in CI/CD
- Image and SBOM signing with Sigstore Cosign
- Admission control policies to enforce SBOM and signature requirements
- Integration with vulnerability management and incident response workflows
Contact us to assess your current supply chain security posture and define a roadmap to SBOM-driven supply chain resilience.
Explore Our Solutions
Related Reading
The Software Supply Chain: Its Importance for Midmarket Cloud Native Businesses
Protect your software supply chain with SBOMs, signed artifacts, and secure CI/CD practices. Essential guidance for midmarket enterprises.
HIPAA Compliance on Kubernetes: A Technical Guide
Running healthcare workloads on Kubernetes requires specific controls. Here's how to meet HIPAA requirements with proper encryption, access controls, and audit logging.
FedRAMP Kubernetes: Running Containers for Federal Workloads
Federal agencies want Kubernetes but FedRAMP adds complexity. Here's how to architect Kubernetes for FedRAMP Moderate and High baselines.
THNKBIG Team
Engineering Insights
Expert infrastructure engineers at THNKBIG, specializing in Kubernetes, cloud platforms, and AI/ML operations.
Ready to make AI operational?
Whether you're planning GPU infrastructure, stabilizing Kubernetes, or moving AI workloads into production — we'll assess where you are and what it takes to get there.
US-based team · All US citizens · Continental United States only