Technical Guidelines on SBOM QBOM CBOM AIBOM HBOM Version 2.0
Summary
CERT-In issued Version 2.0 of its Technical Guidelines on Software Bill of Materials (SBOM), Quantum BOM (QBOM), Cryptographic BOM (CBOM), Artificial Intelligence BOM (AIBOM), and Hardware BOM (HBOM) on July 9, 2025, expanding coverage from the previous version to include QBOM, CBOM, AIBOM, and HBOM frameworks. The guidelines provide minimum elements, implementation roadmaps, classification criteria, and best practices for organizations to develop and adopt BOM ecosystems aligned with software development lifecycle stages. Organizations in India are advised to establish roles, implement vulnerability tracking, and adopt secure SBOM distribution practices according to these guidelines.
“Software products are composed of many different components, some of which might come from third party sources.”
About this source
GovPing monitors India CERT-In Advisories for new data privacy & cybersecurity regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.
What changed
The document introduces Version 2.0 of CERT-In's BOM Technical Guidelines, expanding the scope from SBOM-only guidance to comprehensive coverage of five bill of materials frameworks: Software BOM (SBOM), Quantum BOM (QBOM), Cryptographic BOM (CBOM), Artificial Intelligence BOM (AIBOM), and Hardware BOM (HBOM). The updated guidelines include minimum data elements for each BOM type, organizational implementation roadmaps, classification aligned with software development lifecycle stages, license management considerations, vulnerability tracking processes, and recommendations for secure distribution and sharing of BOMs.
Organizations developing, procuring, or integrating software in India should use these guidelines to establish BOM practices, particularly those managing third-party components, cryptographic assets, AI systems, or hardware supply chains. The guidelines establish baseline expectations for SBOM creation, sharing, and access control that may inform compliance posture for entities subject to cybersecurity requirements.
Archived snapshot
Apr 23, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
Technical Guidelines on |SBOM QBOM &CBOM AIBOM HBOM
Version 2.0
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India
Version 2.0 Dated 09.07.2025
Table of Contents
- Executive Summary ................................................................................................................................. 4
- Overview of SBOM .................................................................................................................................. 6 2.1 Necessity and Utilization ................................................................................................................ 6
2.2 Application & Scope ...................................................................................................................... 6
2.3 SBOM Implementation ................................................................................................................... 8
- Ecosystem ............................................................................................................................................. 11 3.1 Levels of SBOM ........................................................................................................................... 11
3.2 Classification of SBOM ................................................................................................................ 12
3.3 Roadmap for Organizations to develop and adopt SBOM ............................................................ 13
3.4 License Management .................................................................................................................. 19
- SBOM Preparation ................................................................................................................................. 21
- Process and Practices of SBOM for Software Consumer/Developer/Integrator Organizations ............... 29 5.1 Establish Roles and Responsibilities ........................................................................................... 29
5.2 Roadmap for Navigating the Functions of SBOM ......................................................................... 30
5.3 Secure SBOM Distribution: Access Control and Public/Private SBOM ........................................ 32
5.4 SBOM Sharing............................................................................................................................. 33
- Vulnerability Tracking and Analysis in SBOM ......................................................................................... 35
- Recommendations and Best Practices ................................................................................................... 38 7.1 Recommendations .................................................................................................................... 38
7.2 Best Practices ........................................................................................................................... 40
- Quantum BOM (QBOM) & Cryptographic BOM (CBOM) ........................................................................ 42 8.1 What is Crypto & Quantum BOM? ............................................................................................ 42
8.2 Benefits of Quantum and Crypto BOM ...................................................................................... 42
8.3 Minimum elements of QBOM & CBOM ..................................................................................... 44
8.4 Recommendations and Best Practices ...................................................................................... 48
8.5 Quantum-Readiness and Migration Strategy ............................................................................. 51
- Artificial Intelligence Bill of Materials (AIBOM) ........................................................................................ 53 9.1 What is Artificial Intelligence Bill of Materials (AIBOM)? ............................................................ 53
9.2 Benefits of AIBOM .................................................................................................................... 53
9.3 Minimum Elements of AIBOM ................................................................................................... 54
Version 2.0 Dated 09.07.2025 Page 1
9.4 Recommendations and Best Practices ...................................................................................... 56
- Hardware Bill of Material (HBOM) ...................................................................................................... 59 10.1 What is HBOM? ..................................................................................................................... 59
10.2 Benefits of HBOM .................................................................................................................. 59
10.3 Minimum elements of HBOM ................................................................................................. 60
10.4 Recommendations & Best Practices ...................................................................................... 62
Version 2.0 Dated 09.07.2025 Page 2
Tables & Figures List
Table 1: Software Components and the SBOM Author Status in the aforementioned scenario ..................... 9
Table 2: Mapping of level as per Scenario for organization who created SBOM ......................................... 12
Table 3: Syntax for Unique Identifier and Example ..................................................................................... 16
Table 4: Utility of Unique Identifiers ............................................................................................................ 16
Table 5: Minimum Elements of SBOM ........................................................................................................ 21
Table 6: Data Fields for the Components Utilised in Scenario by Organization ........................................... 24
Table 7: Objectives for SBOM Concepts .................................................................................................... 31
Table 8: Minimum Elements of QBOM & CBOM ......................................................................................... 44
Table 9 : Minimum Elements pertaining to Cryptographic Asset ................................................................. 45
Table 10: Minimum Elements of AIBOM ..................................................................................................... 54
Table 11: Minimum Elements of HBOM ...................................................................................................... 60
Figure 1: Flow Chart for the Scenario ......................................................................................................... 10
Figure 2: Levels of SBOM ........................................................................................................................... 11
Figure 3: SBOM Classification Aligned with SDLC Stages .......................................................................... 13
Figure 4: Steps & its Activities for Developing SBOM Ecosystem at Organizational Level .......................... 14
Figure 5: Benefits of Automation Support in SBOM .................................................................................... 27
Figure 6: Steps to Establish Roles & Responsibilities ................................................................................. 29
Figure 7: Vulnerability Tracking and Analysis in SBOM Steps Sequence Example ..................................... 35
Version 2.0 Dated 09.07.2025 Page 3
Executive Summary
Software products are composed of many different components, some of which might come from third party sources. These third-party components and dependencies can have vulnerabilities, which attackers can exploit, leading to security incident or breaches. Key threats include attackers inserting malicious code, vulnerabilities in outdated components, and breaches by compromised suppliers. These issues can lead to data breaches, operational disruptions, and reputational damage. These threats can be countered by maintaining visibility & transparency on software components used for building or developing the software. Software Bill of Materials (SBOM) helps organizations know exactly what components are in their software or assets, making it easier to identify and fix vulnerabilities. By using SBOMs, entities can improve their software security and protect against potential threats. A Software Bill of Materials (SBOM) is list of all the components, libraries, and modules that make up a software, providing transparency into its composition. Software composition is important to comprehend as it grows more sophisticated and depends on more external components. In cybersecurity, safeguarding software against cyberattacks requires an awareness of the dependencies and components utilized in its construction. An SBOM is therefore a crucial instrument in contemporary cybersecurity procedures. An SBOM is vital for maintaining software security. It helps organizations understand what their software is made of, manage potential risks, respond to security issues, and comply with regulations. Following are the key benefits an organization can derive by implementing SBOM:Enhanced Security Management: By knowing the components of the software, organizations
can identify which components might be vulnerable to security threats for mitigation.Effective Incident Response: In the event of a cyber-security incident, an SBOM assists in
speeding up incident response by providing detailed component information.Vulnerabilities Identification and Patch Management: By listing all components,
organizations can quickly spot and address known vulnerabilities in the software by patching them. Version 2.0 Dated 09.07.2025 Page 4Supply Chain Security: Supply chain risks can be reduced significantly by gaining visibility into
third-party components used in creating a software.Assist in Ensuring Compliance: SBOM helps organizations to streamline adherence to
security regulations, guidelines and best practices on software security by providing required transparency in software composition.Improved Operational Efficiency: With a clear understanding of software components,
organizations can streamline their vulnerability management processes, saving time and resources. Indian Computer Emergency Response Team (CERT-In) has released following technical SBOM guidelines for entities, particularly those in the public sector, government, essential services, organizations involved in software export and software services industry. Departments and organizations are encouraged to make the creation and provision of Software Bill of Materials (SBOM) a mandatory standard practice as part of software procurement and software development in order to enhance security and reduce the risk of cyber threats. The following chapters delve into various technical aspects of the Software Bill of Materials (SBOM) explaining its purpose, and its growing significance in the software supply chain ecosystem. Second chapter provides overview of SBOM and discuss about the scope and implementation of SBOM, followed by a chapter on SBOM ecosystem, which explains different levels and classifications of SBOM. Subsequent chapters, explore the different standards and data formats employed for representing SBOM information, and elaborate on the minimum elements, data fields, and automation support. Objectives of all processes and practices involved in SBOM, secure SBOM sharing, and distribution are elaborated in this document including approaches for vulnerability tracking and analysis in SBOM. Finally, the last chapter of the document covers recommendations and best practices for SBOM implementation.
Version 2.0 Dated 09.07.2025 Page 5
- Overview of SBOM 2.1 Necessity and Utilization
Increasing software complexity emphasizes the necessity of SBOM, serving as the foundation for Software Composition Analysis (SCA) tools, aiding in vulnerability detection, license compliance and instrumental in vendor risk management. The production of software-defined systems has considerably expanded the cyber threat landscape, with adversaries increasingly targeting the software supply chain to infiltrate sensitive systems and data. In order to improve security, compliance, risk management, supply chain transparency, quality assurance, interoperability, and vendor management in their software development and procurement processes, departments/ organizations are encouraged to prioritize the creation and provision of Software Bill of Materials (SBOM) as a standard practice. Organizations should thoroughly analyze the critical components involved in any stage of the software lifecycle - including design, development, analysis, deployment, maintenance, and update - and mandate SBOM usage. SBOM help serve three main purposes, as follows:
Implementing SBOM can assist government departments and organizations in making
informed pre-acquisition decisions for software purchases.
Adopting SBOM can facilitate vulnerability management, asset tracking and compliance
across the government entities and essential sector organisations.
SBOM implementation can aid organizations in Software development and maintenance of
their products. It is recommended that all the Government, Public Sector and Essential Services Organizations should include requirements for SBOM in all their software and solutions purchase/procurement. It is also recommended that security teams of user organizations should include SBOM inventory in work flow of vulnerability management.
2.2 Application & Scope
This guideline has been issued by Indian Computer Emergency Response Team (CERT-In) for the following entities especially in the Government, Public Sector, Essential Services Organizations and organizations involved with software exports and software services industry: Version 2.0 Dated 09.07.2025 Page 6
Software Consumer - Organizations that acquire software applications to support their
operations, enhance productivity, and achieve their business objectives.Software Developer- Organizations that develop customized software solutions.
System Integrator/Software Reseller- Organizations that distribute the software products and
also provide value-added services including customization, integration, support, and training. SBOM are becoming an essential tool for visibility, vulnerability patching, reducing exposure and quick response. For instance, a typical organization relies on a vast network of interconnected systems, end points, control systems, automation software, and operational technology (OT) components. Maintaining accurate SBOM for these complex IT and OT environments allows security teams to better understand their attack surface and respond more effectively to vulnerabilities. This proactive approach helps organizations safeguard their operations and ensure resilience against cyber threats. For example, in financial institutions SBOM proves invaluable from a cybersecurity standpoint. Banks and fintech companies often utilize a wide array of commercial off-the-shelf (COTS) software, open-source libraries, and custom-developed components to power their digital services and backend systems. Maintaining an up-to-date SBOM for this heterogeneous software landscape enables security teams to rapidly identify and mitigate vulnerabilities, comply with industry regulations, and better manage supply chain risks. The use-cases of the SBOM, with respect to software development, supply chain management, cybersecurity, and regulatory compliance are:
2.2.1 Software Development and Maintenance: SBOM provides a detailed inventory of the
components and dependencies that make up a software system. This information allows developers to more effectively manage vulnerabilities, track licenses, and monitor the provenance of their software. Maintaining an accurate and up-to-date SBOM is crucial for organizations to understand their software supply chain risks and take proactive measures so as to ensure the security and integrity of their applications.
2.2.2 Supply Chain Management: SBOM provides transparency into the software supply
chain, allowing organizations to assess the security and reliability of third-party components. It helps in identifying potential risks associated with the use of third-party
Version 2.0 Dated 09.07.2025 Page 7
libraries or components and facilitates informed decision-making about procurement and vendor management.
2.2.3 Cybersecurity: SBOM helps in integration with existing security tools, automating
vulnerability detection, remediation and plays a crucial role in cybersecurity practices. SBOM provides visibility into the software components and their dependencies, enabling organizations to identify and mitigate security vulnerabilities effectively. By having a comprehensive understanding of software composition, organizations can quickly respond to security incidents, patch vulnerabilities, and ensure the integrity and security of their software systems.
2.2.4 Regulatory Compliance: SBOM is increasingly becoming a requirement for regulatory
compliance in various industries, especially in sectors dealing with essential services such as healthcare, finance, and government. Globally regulators are recognizing the SBOM as a promising tool and are emphasizing SBOM adoptions through their regulations such as EU Cyber Resilience Act.
2.2.5 Risk Management: SBOM supports risk management efforts by providing insights into
the software supply chain. Organizations can assess the potential risks associated with specific software components, such as known vulnerabilities, license conflicts, or deprecated libraries. By proactively managing these risks, organizations can enhance the resilience of their software systems and minimize the likelihood of security breaches or compliance issues.
2.2.6 Interoperability and Compatibility: SBOM facilitates interoperability and compatibility
testing by providing detailed information about software components and their versions. This helps in ensuring that different software systems can work together seamlessly without compatibility issues, and hence improving the overall quality and reliability of software products.
2.3 SBOM Implementation
SBOM should be implemented for every new software component release and updated promptly for any changes such as updates, upgrades, releases, and patches. The accuracy of SBOM is maintained by updating whenever there is a new information about included components, regardless of whether the components themselves have changed. When modifying existing components, Version 2.0 Dated 09.07.2025 Page 8
choose a consistent approach: either treat the change as a new component or update the existing one. For clarity, use standardized versioning methods throughout. Consider the following scenario in an organization:
Government organization GovInsights hires a software development company TechGenius
to develop a data analytics application DataAnalyzerIn order to develop the product: DataAnalyzer, Company: TechGenius uses the following
components:SMS and Email services namely Postfix & Twilio SDK by the company:
MessageMaster.
- Database component: PostgreSQL by the company: DataVault
- Apache Tomcat Server provided by company: ServerSolutions which has used many open source libraries for their server.
Various components/software in the aforementioned scenario and their corresponding SBOM type and the status is provided in the table below: Table 1: Software Components and the SBOM Author Status in the aforementioned scenario
1 SBOM for DataAnalyzer application To be developed by Company TechGenius and will be provided to GovInsights organisation along with the product/application i.e. DataAnalyzer 2 SBOM for PostgreSQL Top level SBOM was developed by
TechGenius as DataVault never created a
SBOM for this component 3 SBOM for the platform Apache Tomcat Delivery SBOM was created by the company
Server ServerSolutions and shared with TechGenius when the platform was
procured by TechGenius 4 SBOM for the Postfix & Twilio SDK Transitive SBOM was created by the company TechGenius as SBOM was not made available by MessageMaster The interrelationships among the stakeholders and components in this scenario are visually represented in Figure 1. As depicted, numerous entities within the SBOM ecosystem, function as both providers and consumers of software. This entails not only utilizing information from an SBOM provided by another entity but also participating in the creation of an SBOM for newly developed components and subsequently sharing it with other entities. Ideally, the creator of a software component should also be responsible for authoring the corresponding SBOM. Version 2.0 Dated 09.07.2025 Page 9
- No Name SBOM Author Status SBOM Consumer: Must ask for complete SBOM. Software Developer: Must ensure that correct and complete SBOM is supplied to consumer.
Figure 1: Flow Chart for the Scenario
Version 2.0 Dated 09.07.2025 Page 10
- Ecosystem SBOM ecosystem encompasses the network of stakeholders, tools, standards, and processes involved in the creation, distribution, analysis, and utilization of SBOM across the software supply chain. This section describes an approach for Software Consumer/Software Developer/ System Integrator organizations to develop a SBOM ecosystem at an organizational level. This section also explains different classification of SBOM.
3.1 Levels of SBOM
The different levels of SBOM, each offering varying degrees of granularity and complexity indicates specific needs and the complexity of their respective software environments. Organizations should choose to implement one or more SBOM levels to achieve the efficient balance of transparency, risk management, and operational efficiency.
Top-Level SBOM n-Level SBOM Delivery SBOM Transitive SBOM Complete SBOM
Provides a general Goes beyond top-level Describes every part, Includes not only the Offers a complete summary of the overview to include library, and direct dependencies and exhaustive list software elements deeper details and dependency that is of a software of all the parts, that are either complexities. part of a software component but also dependencies, and integrated or directly release or delivery its indirect or related metadata used in a product. The "N" in "N-level" package. It offers transitive that are present in Essential details like represents any arbitrary clarity regarding the dependencies. a software system. component names, level of depth, indicating makeup of the versions, and their that the SBOM includes software that is being interactions within the information at multiple supplied. software are usually tiers or levels of included. granularity.
Figure 2: Levels of SBOM
Adopting a multiple SBOM approach can significantly enhance an organization's cyber resilience. Organizations should create a customized SBOM for consumers, addressing security requirements without exposing sensitive data. Concurrently, they should maintain an internal SBOM at the "complete" level to identify and share vulnerability updates specific to that software in detail with the consumer periodically on a mandatory basis. This approach balances cyber resilience, data Version 2.0 Dated 09.07.2025 Page 11
confidentiality, and collaborative security across the ecosystem, especially in scenarios where organizations face constraints or apprehensions regarding data leaks and intellectual property theft resulting from sharing complete software and dependency details.
Table 2: Mapping of level as per Scenario for organization who created SBOM
1 SBOM for DataAnalyzer Complete SBOM To be developed by Company TechGenius and application will be provided to
GovInsights organization
along with the product/application i.e. 2 SBOM for PostgreSQL Top level SBOM Top level SBOM was developed by TechGenius as DataVault never created a SBOM for this component 3 SBOM for the platform Apache Delivery SBOM Delivery SBOM was created
Tomcat Server by the company
ServerSolutions and shared
with TechGenius when the platform was procured by 4 SBOM for the Postfix & Twilio Transitive SBOM Transitive SBOM was
SDK created by the company
TechGenius as SBOM was
not made available by
3.2 Classification of SBOM
SBOM classifications align with stages in the software development lifecycle, each providing distinct data and insights. Different classifications of SBOM have been depicted in Figure 3.
3.2.1 The Design SBOM captures planned components, even before they exist.
3.2.2 The Source SBOM reflects the development environment, including source files and
dependencies.
3.2.3 The Build SBOM is generated during the build process, incorporating details like
source files, dependencies, and pre-built components.
3.2.4 The Analyzed SBOM is created by inspecting final software artifacts post-build.
Version 2.0 Dated 09.07.2025 Page 12
- No Name SBOM level SBOM Author Status DataAnalyzerMessageMasterTechGenius 3.2.5 The Deployed SBOM provides an inventory of the software installed and configured
on a specific system, combining information from various SBOM types and taking into account the deployment environment.
3.2.6 The Runtime SBOM is created by monitoring active software components, including
their external interactions and dynamically loaded dependencies, during runtime execution.
Design SBOM Source SBOM Build SBOM Analyzed SBOM Deployed SBOM Runtime SBOM
Figure 3: SBOM Classification Aligned with SDLC Stages
3.3 Roadmap for Organizations to develop and adopt SBOM
To establish a SBOM ecosystem within an organization the development of an SBOM program should follow a phased approach, starting from a basic foundation (START), then building upon it (PROGRESS), and ultimately reaching a mature and scalable SBOM implementation (ADVANCE). The order of activities is indicative. Organization may choose to move an activity up or down depending on their overall security requirements, project timeline and resource availability.
Version 2.0 Dated 09.07.2025 Page 13
START PROGRESS ADVANCE (Foundational Activities ) (Building upon it) (Mature & Scalable SBOM) •Identify Critical Assets and •Secure Installation and •Enhance vulnerability tracking Develop a Project Plan. Operation Guidance processes. Development.•Determine the SBOM format •Enhance Incident response and minimum requirements. •Assign unique identifiers to process. each component. security •Analysis and review for•Identify requirements, •Mapping of supplier's SBOM updation of existing SBOMsecure storage and tooling. with consumer's internal SBOM. periodically.•Acquire SBOM as a part of •Preparation of SBOM •Maintain awareness of emeringprocurement process. software components and •Integrate SBOM in each phase industry advancements. of Secure Software Development Lifecycle. •Establish secure configuration management.
Figure 4: Steps & its Activities for Developing SBOM Ecosystem at Organizational Level 3.3.1 PHASE-1 (START): The foundational activities will lay the groundwork for the SBOM program.
It is likely the first SBOM will be acquired from suppliers during the procurement process. Since the software can vary in terms of its architecture, existing resources, budget, availability of qualified individuals, the intent of this phase is to establish methods that enable kick-start of the SBOM ecosystem within an organization.
3.3.1.1 Identify Critical Assets and Develop a Project Plan: Develop a comprehensive
project plan that define roles, responsibilities, timelines, and resource requirements. Alongside the project plan, identify the change management requirements to ensure stakeholder are onboard for the new SBOM processes.
3.3.1.2 Determine the SBOM format and minimum requirement: Defining the SBOM
format and minimum data requirements before its creation is critical. It ensures a standardized, machine-readable structure that enables consistent sharing and processing across the supply chain.
3.3.1.3 Identify security requirements, secure storage and tooling: This entails
determining the appropriate classification and handling procedures in line with site security policies. Next, organizations should establish secure storage for SBOM, initially segregating individual SBOM in dedicated repositories. As the SBOM program matures, integration with asset management applications should be Version 2.0 Dated 09.07.2025 Page 14
pursued, along with linking to other security-related information like vulnerability data.
3.3.1.4 Acquire SBOM as a part of procurement process: By requiring SBOM provision
by suppliers in purchase orders or contracts, specifying SBOM elements, delivery timeframe, and delivery method, transparency is ensured, facilitating the SBOM integration process.
3.3.2 PHASE - 2 (PROGRESS): This involves sustaining activities resulting in establishment of
secure installation and configuration management, along with integrating unique component identification to address Supplier and Component namespace issues. Integration with Secure Software Development Life Cycle (SSDLC) by Software Developer Organization will begin to provide actionable security information to secure the software in its build phase.
3.3.2.1 Secure Installation and Operation Guidance Development: A comprehensive
checklist for secure software installation and operation, tailored to the target consumer's technology sector and usage needs should be created by the supplier in correlation with consumer organization. To ensure secure operations, a set of key checklist pointers can be derived from the Guidelines for Secure Application Design, Development, Implementation & Operations guidelines, highlighting essential considerations that should be addressed throughout the deployment and operational phases of an application's lifecycle.
3.3.2.2 Assign unique identifiers to each component: Consumers may overlook
security updates or vulnerabilities if unaware of rebranding, leaving them vulnerable to exploitation. This makes it challenging for consumers to research the accurate data fields, such as current supplier and component names, to include in their own SBOM. Supplier and component name changes would result in an SBOM revision and a link from the old SBOM to its successor to maintain revision history. However, in cases where the historical context may be unknown to the consumer, mapping older names to current ones can be problematic, especially if the original supplier no longer exists. To address this, a unique identifier should be created. This identifier may follow the following structure:
Version 2.0 Dated 09.07.2025 Page 15
Table 3: Syntax for Unique Identifier and Example
Field Description Example
Indicates the format of the identifier, in this case, pkg scheme pkg for the Package URL (PURL) format. Specifies the type of the identifier, in this case, type supplier to represent the supplier of the software Supplier component. Identifies the name of the organization or entity that Apache Software namespace is the supplier of the software component. Foundation name Provides the name of the software component itself. Apache Tomcat Denotes the specific version of the software version 9.0.71 component. Allows for the inclusion of additional contextual qualifiers information about the software component, such as arch=x8664&os=linux (optional) architecture, operating system, or other metadata. subpath Can be used to specify a subpath or location within #server/webapps (optional) the software component, if applicable. The unique identifier for the scenario would be: pkg:supplier/ApacheSoftwareFoundation/ApacheTomcat@9.0.71?arch=x8664&os=linux#server/ webapps
Table 4: Utility of Unique Identifiers Issue Apache Tomcat Example How the Unique Identifier Helps
Ownership and Initially, Apache Tomcat was The unique identifier pkg:supplier/Apache Branding Changes developed and maintained by Software Foundation/Apache the Apache Software Tomcat@9.0.71?arch=x8664&os=linux would Foundation. Over time, the still be valid, even with ownership and branding ownership could change, and changes. the new owner might rebrand The consumer can update the SBOM with the new the project (e.g., "TomcatX" or identifier pkg:supplier/Acme "Acme Tomcat"). Corp/TomcatX@9.0.71?arch=x8664&os=linux,
Version 2.0 Dated 09.07.2025 Page 16
Issue Apache Tomcat Example How the Unique Identifier Helps
maintaining the linkage between old and new component names. Version Ambiguity The vendor releases a new The unique identifier pkg:supplier/Apache version of Apache Tomcat (e.g., Software Foundation/Apache 10.0.0), but keeps the same Tomcat@9.0.71?arch=x8664&os=linux clearly component name. indicates the specific version (9.0.71). When a new version is released, the consumer can update the SBOM with pkg:supplier/Apache Software Foundation/Apache Tomcat@10.0.0?arch=x8664&os=linux, eliminating version ambiguity.
3.3.2.3 Mapping of supplier's SBOM with consumer's internal SBOM: The consumer
organization should map and develop an internal SBOM on the basis of SBOM provided by the supplier. It should also include author name (personnel of consumer organization) and timestamp to trace the integrity and efficient updating of the developer of that internal SBOM.
3.3.2.4 Preparation of SBOM: SBOM should be prepared by both supplier and consumer
organization. Identify installed components with vulnerabilities by correlating the known vulnerability data and vendor vulnerability attestations. Known vulnerability data is available through various sources, including vendor notifications, third-party notifications, and data repositories. On this basis, a complete-level SBOM should be generated either internally by organization or externally by the software vendor for enhancing the security and visibility of supply chain attacks.
3.3.2.5 Integrate SBOM in each phase of Secure Software Development Lifecycle (SSDLC): SBOM can be incorporated into each phase of the SSDLC by Software
Developer organization in such a way that during design, SBOM should inform decisions regarding component selection and potential security risks. The use of SBOM during software development can improve efficiencies and provide greater insight into build and source components, as well as product functionality, for both the developer and user. Version 2.0 Dated 09.07.2025 Page 17
3.3.2.6 Establish secure configuration management: Implement stringent access
controls encryption, periodic audits of software, and integration with security frameworks to ensure secure configuration management in SBOM.
3.3.3 PHASE-3 (ADVANCE): Enhancing activities related for monitoring of vulnerabilities and
seamless integration of SBOM with security orchestration tools for vulnerability management and incident response.
3.3.3.1 Enhance vulnerability tracking processes: Capture vulnerability information
associated with SBOM. Historical vulnerability information should be integrated into the SBOM ecosystem, and specialists should have procedures such as cross- referencing the identified vulnerabilities with the components listed in the SBOM repository and checking the equipment database for relevant configuration data to assess the impact and potential mitigation measures for tracking and analysis of known-vulnerabilities.
3.3.3.2 Enhance Incident response process: CERT-In issues alerts, vulnerabilities
notes and advisories on various threats. Often, these threats are associated with newly disclosed software vulnerabilities. Organization should establish threat hunting teams that use this information to determine if their organizations are vulnerable to the newly discovered threat and whether they have been compromised by it.
3.3.3.3 Periodic Analysis and Review for Updating Existing SBOM: This involves
checking if software components and their dependencies are as per latest records, ensuring timely updates.
3.3.3.4 Maintain awareness of emerging software components and industry advancements: Organizations are encouraged to uphold SBOM awareness
programs either independently or in collaboration to third-party organizations to share the information on emerging SBOM formats, data elements, its implementation in organization in adherence to challenges faced by SBOM practitioners.
Version 2.0 Dated 09.07.2025 Page 18
3.4 License Management License management is an early use case for SBOM, helping organizations with large and complex software portfolios track the licenses and terms of their diverse software components, especially for open-source software. SBOM can convey data about the licenses for each component. This data can also allow the consumer to know if the software can be used as a component of another application without creating legal risk. License information for components included in software can be checked to prevent negligence in compliance, thus reducing the risk of license violations and the workloads required for license management. Following practices streamlines license management processes and helps mitigate risks associated with non-compliance.
Consumer should be able to view the licenses of all individual components within a Product
being evaluated, alongside the Product's own license. This provides the user with better insight when selecting a product and determining the suitable license arrangement for their business requirements or applicationIdentify each software license using an identifier (e.g. SPDX identifier). These identifiers,
along with expressions, serve as unique codes that represent specific license terms and conditions. By leveraging these identifiers, organizations should efficiently manage and understand the licensing obligations associated with their software assets.An alternative license database should be considered, if the license identifiers cannot be
found in the primary one, such as the Scancode LicenseDB AboutCode. These alternative identifiers should be prefixed (e.g. "LicenseRef-scancode-") to indicate their origin, thus facilitating mapping and understanding.When encountering licenses that are not recognized by established lists like SPDX,
organizations should assign a unique identifier. This ensures proper identification and tracking of unknown licenses within their systems.When modifying licenses with placeholders or templates, it is recommended to ensure that
these changes don't alter the fundamental terms of the license. Instead, they should be considered part of the original license identified by its unique identifier, like those provided by SPDX License Expressions. This helps maintain clarity and consistency in license management practices.When dealing with multiple licenses for software, it is important to use operators (e.g. SPDX
operators) to combine them correctly. These operators help link different license identifiers Version 2.0 Dated 09.07.2025 Page 19
together, ensuring clarity and consistency in license expressions. This ensures that the resulting license expressions accurately represent the licensing terms applicable to the software.
When managing licenses, any exception clauses attached to a license text should be linked
to the main license identifier using appropriate operators such as "WITH" for SPDX operators. Additionally, the exception clause names should be described with identifiers following the established requirements for license identification.When making slight changes to a license text, if the modifications do not significantly alter
the meaning of the original license, it is recommended to use the same identifier as the original license. Version 2.0 Dated 09.07.2025 Page 20SBOM Preparation
4.1 Minimum Elements of SBOM
Minimum Elements of the SBOM dictates the "Data Fields" as the necessary information . related to a component in a software to be considered With "Automation Support" detection and management can be enhanced by integrating with security orchestration tools and the "Process and Practice" for implementation of the SBOM in the organization. The "Minimum Elements" categories and definitions are as follows.
Table 5: Minimum Elements of SBOM Minimum Overview Definition Elements Data Fields Document baseline information This baseline component information includes:
Component Name about each component that
Component Version should be tracked.
Component Description Component Supplier Component License Component Origin Component Dependencies Vulnerabilities Patch Status Release Date End-of-Life (EOL) Date Criticality Usage Restrictions Checksums or Hashes Comments or Notes Author of SBOM Data Timestamp Executable Property Archive Property
Version 2.0 Dated 09.07.2025 Page 21
Minimum Overview Definition Elements
Structured Property
Unique Identifier
Automation Support automation, including Data formats used to generate and consume
Support via automatic generation and SBOM include machine-readability to allow for Software Package Data Exchange scaling across the software (SPDX) ecosystem. CycloneDX
Practices Define the operations of SBOM Organizations definition of SBOM operation
and requests, generation and use. procedure should be based on:
Processes Frequency Depth Known Unknowns Distribution and Delivery Access Control Accommodation of Mistakes
4.2 Data Fields
Data fields contain a baseline information regarding each component that needs to be tracked and maintained. The organizations can create a comprehensive inventory of software components, dependencies, and associated metadata, enabling better transparency, security, and risk management throughout the software development lifecycle. Enabling adequate identification of these components is the aim of data fields, as it facilitates their tracking throughout the software supply chain and allows them to be mapped to other useful data sources like vulnerability or license database. The baseline components information include:
- Component Name: The name of the software component or library included in the SBOM.
Component Version: The version number or identifier of the software component.
Version 2.0 Dated 09.07.2025 Page 22 Component Description: A brief description or summary of the functionality and purpose
of the software component.Component Supplier: The entity or organization that supplied the software component,
such as a vendor, third-party supplier, or open-source project.Component License: The license under which the software component is distributed,
including details such as the license type, terms, and restrictions.Component Origin: The source or origin of the software component, such as whether it is
proprietary, open-source, or obtained from a third-party vendor.Component Dependencies: Any other software components or libraries that the current
component depends on, including their names and versions.Vulnerabilities: Information about known security vulnerabilities or weaknesses associated
with the software component, including severity ratings and references to security advisories or CVE identifiers.Patch Status: The patch or update status of the software component, indicating whether
any patches or updates are available to address known vulnerabilities or issues.Release Date: The date when the software component was released or made available for
use.End-of-Life (EOL) Date: The date when support or maintenance for the software
component is scheduled to end, indicating the end of its lifecycle.Criticality: The criticality or importance of the software component to the overall
functionality or security of the application, often categorized as critical, high, medium, or low.Usage Restrictions: Any usage restrictions or limitations associated with the software
component, such as export control restrictions or intellectual property rights.Checksums or Hashes: Cryptographic checksums or hashes of the software component
files to ensure integrity and authenticity.Comments or Notes: Additional comments, notes, or annotations relevant to the software
component or its inclusion in the SBOM.Author of SBOM Data: The name of the entity that creates the SBOM data for this
component.Timestamp: Record of the date and time of the SBOM data assembly.
Version 2.0 Dated 09.07.2025 Page 23Executable Property: Attributes indicating whether a component within an SBOM can be
executed.Archive Property: Characteristics denoting if a component within an SBOM is stored as an
archive or compressed file.Structured Property: Descriptors defining the organized format of data within a component
listed in an SBOM.Unique Identifier: A unique identifier is a distinct code assigned to each software
component, structured as "pkg:supplier/OrganizationName/ComponentName@Version?qualifiers&subpath," aiding in tracking ownership changes and version updates, thus ensuring accurate and consistent software component management.
Table 6: Data Fields for the Components Utilised in Scenario by Organization
Version 9.0.41 13.3 3.5.6 7.17.0 Description Open-source Java Open-source Open-source mail Twilio API web server relational database transfer agent SDK for management system (MTA) sending and receiving SMS
Supplier Apache Software PostgreSQL Global Postfix Twilio Inc. Foundation Development Group Development Team
License Apache Software PostgreSQL License IBM Public Apache Foundation License v1.0 License 2.0
Origin Apache License 2.0 Open-source Open-source Vendor community community
Dependencies Open-source None None None community
Vulnerabilities Java Runtime None reported None reported None Environment (JRE) reported
Patch Status None reported Up to date Up to date Up to date Release Date Up to date May 7, 2021 October 15, 2020 January 10,
Version 2.0 Dated 09.07.2025 Page 24
End of Life Date March 22, 2021 May 7, 2026 October 15, 2025 January 10,
Criticality March 22, 2025 High High Medium Usage Restrictions High None None Requires
Twilio account for API access
Checksums None SHA-256: SHA-256: SHA-256: d7f5a6b198e75c1f4 3bd5a7f02a8102 9f3b2e5ab24 38d0fa158a9bc92 2a47a7e6cb9cb5 a5e68a3bda e2b8 6a12c1febd1
Hashes SHA-256: MD5: MD5: MD5: 7f87a8b8ed5c235467 b8c78139eef440fb3 e57cb8d0ae875fd 6a8c4db98ce 89b8d7586219a1 cb074e199b1e923 a9d60291f10689 5f0c3a92416 e4b 727bc80a5e
Comments MD5: Supports SQL Facilitates the Integrates 8937d8b1a947f45d79 queries and ACID delivery of emails SMS e457b91c2e6543 transactions. between mail functionality servers. into applications via Twilio's cloud communicati ons platform.
Executable Yes - Contains No - Binaries like No - Binaries like No - The SDK
Property executable binaries postgres are not postfix are not itself is not like catalina.sh and directly executable. directly directly startup.bat. executable. executable, but contains libraries and modules that can be used by applications.
Version 2.0 Dated 09.07.2025 Page 25
Archive Property No - Distributed as a No - Distributed as a No - Distributed Yes - directory structure. set of installation as a set of Distributed as files including installation files a package or postgresql.conf. including main.cf. library archive file, such as twilio- python.tar.gz or twilio- java.jar.
Structured Yes - Configuration Yes - Database Yes - Yes - The
Property files such as schemas and files Configuration files SDK includes server.xml have like schema.sql have such as main.cf structured defined elements. structured formats. and master.cf files defining have structured API methods formats. and configuration s, such as twilio.py or twilio.xml.
Unique Identifier pkg:supplier/ApacheS pkg:supplier/Postgre pkg:supplier/Postf supplier/Twili oftwareFoundation/Ap SQLGlobalDevelop ixFoundation/Post oInc/TwilioS acheTomcat@9.0.71? mentGroup/Postgre fix@3.6.2?arch=x DK@1.20.0? arch=x8664&os=linu SQL@13.5?arch=x8 8664&os=linux arch=x8664 x#server/webapps 664&os=linux &os=linux 4.3 Automation Support Supporting automation, such as automatic generation and machine-readability, enables scaling across software ecosystems and organizational boundaries. It allows for seamless integration of SBOM data into various tools and processes, facilitating collaboration and visibility across the software supply chain
Version 2.0 Dated 09.07.2025 Page 26
Discovery Analysis Assessment Compliance Automated tools can Automation tools can Automated Automated Automated license scan software monitor software dependency analysis vulnerability scanning tools can packages, repositories and tools can identify and scanning tools can analyze software repositories, and package managers document analyze software components to source code to to track changes and dependencies components against identify the licenses identify and updates to software between software known vulnerability under which they are catalogue software components. This components databases, such as distributed. This components ensures that SBOM automatically. This the National helps in ensuring automatically. This remain up-to-date helps in Vulnerability compliance with helps in creating an with the latest understanding the Database (NVD) or licensing initial inventory of versions of complex Common requirements and components without components, relationships Vulnerabilities and avoiding legal issues manual intervention. reducing the risk of between Exposures (CVE). associated with the using outdated or components and unauthorized use of vulnerable software. assessing the proprietary or open- potential impact of source software. changes or vulnerabilities.
SBOM Generation Integration with Reporting and Integration with Monitoring and DevOps Pipelines Visualization Security Maintenance Orchestration
Platforms Automated SBOM Automation tools can Automated reporting Automation tools can Automation tools can generation tools can integrate SBOM and visualisation integrate with facilitate continuous aggregate generation and tools can generate security monitoring and information from analysis into DevOps actionable insights orchestration maintenance of various sources, pipelines, allowing from SBOM data, platforms to SBOM by such as software for continuous such as identifying automate automatically repositories, monitoring and high-risk remediation updating component package manifests, assessment of components, workflows information, tracking and vulnerability software tracking compliance SBOM analysis changes, and databases, to create components status, and results. This enables generating alerts for comprehensive throughout the visualising automatic anomalies or SBOM automatically. development dependency graphs. deployment of compliance This streamlines the lifecycle. This This helps patches, updates, or violations. process of SBOM enables proactive stakeholders make configuration creation and ensures identification and informed decisions changes to mitigate consistency and mitigation of security and prioritize efforts security accuracy across risks and compliance for risk mitigation and vulnerabilities multiple projects. issues. remediation. quickly. Figure 5: Benefits of Automation Support in SBOM
Version 2.0 Dated 09.07.2025 Page 27 Component Version Tracking Dependency Vulnerability License based on
Utilizing SBOM data will require tooling, which calls for consistent data formats and implementation. Automation can support various aspects of SBOM creation, maintenance, and utilization. Organizations may include this feature in their current vulnerability management procedures and audit compliance with security policies in real time. Both will depend heavily on automation, which calls for standard, machine-readable data formats. The standard format used to generate and consume SBOM is:
- Software Package Data eXchange (SPDX)
CycloneDX
Version 2.0 Dated 09.07.2025 Page 28Process and Practices of SBOM for Software
Consumer/Developer/Integrator Organizations
This section discusses how practitioners should perceive SBOM and what processes need to be established to address it in practice. The topics mentioned in this chapter are derived from the analysis of SBOM practices from SBOM generation, distribution and sharing, validation and verification, and vulnerability and exploitability management.
5.1 Establish Roles and Responsibilities
To implement the SBOM, identify the necessary roles and responsibilities. This should include a management sponsor, project lead, systems engineer, design engineer, procurement specialist, and operations representative. Involve additional support, such as IT, cybersecurity, and maintenance personnel, based on the project timeline and security requirements. Ensure clear ownership and collaboration across these roles to drive the SBOM implementation and integration with existing processes.
Define SBOM-Related Assign Roles and Identify Key StakeholdersResponsibilities Ownership Enable Collaboration & Provide Training and Establish Governance Resources Monitor and Refine
Figure 6: Steps to Establish Roles & Responsibilities
- Identify key Stakeholders: To identify the key stakeholders for an SBOM program, organizations should consider representatives from software development, IT operations, security, procurement, business leadership, compliance teams and regulatory bodies. Version 2.0 Dated 09.07.2025 Page 29
Include cybersecurity specialists to provide expertise on secure data handling, vulnerability management, and risk assessment.
Define SBOM-Related Responsibilities: Outline tasks such as SBOM generation,
consumption, vulnerability monitoring, supplier engagement, and secure data management. Assign cybersecurity-focused responsibilities, such as: Classifying SBOM data based on sensitivity and risk, implementing secure SBOM storage and access controls, Integrating SBOM data with vulnerability management and incident response processesAssign Roles and Ownership: Designate a cybersecurity specialist as the SBOM program
owner or co-owner to ensure security is embedded throughout. Allocate SBOM responsibilities to stakeholders based on their expertise, with the cybersecurity team playing a key role.Establish Governance: The governance structure should involve key stakeholders from
across the organization as discussed in 1 pointer. This governance body would then develop st SBOM-specific policies, standards, processes and assign clear accountability, and implement controls to secure the SBOM data.Enable Collaboration: Foster cross-functional collaboration between software, IT, and
cybersecurity teams to address SBOM security challenges. Encourage knowledge sharing on secure SBOM practices, emerging threats, and best-in-class security controls.Provide Training and Resources: Offer specialized training on SBOM security requirements,
secure data handling, and integrating SBOM with each phase of SSDLC. Equip the team with secure SBOM generation, storage, and consumption tools, as well as vulnerability management and threat intelligence resources.Monitor and Refine: Organizations should conduct regular audits and assessments. This
should also involve continuously assessing the SBOM program's security posture and make adjustments to address evolving threats and compliance requirements.
5.2 Roadmap for Navigating the Functions of SBOM
This section explores the goals of the three main aspects of SBOM namely practices, tooling support, and associated issues, aiming to offer Software Developer/Consumer/Integrator organizations a roadmap for navigating the diverse functions and what exactly to be achieved in that specific aspect of SBOM in practice. Version 2.0 Dated 09.07.2025 Page 30
Table 7: Objectives for SBOM Concepts SBOM Objectives Functions
Benefits Improved transparency and visibility into software products should be the primary benefits of SBOM, which forms the foundation for a potential SBOM-centric ecosystem.
The advantages of SBOM should outweigh the costs associated with
learning and managing SBOM and their supporting tools. Adoption The third-party (open source or proprietary) components should be equipped with SBOM.
SBOM should be generated for all software products (produced/used)
within an organization. Generation SBOM should be generated at different stages of the software Points development lifecycle.
A new SBOM should always be re-generated when there is any
change to software artifacts. Data Fields & SBOM should be customized with more organization-specific use standardization cases in terms of data fields and format in addition to an existing minimum number of elements and standard formats. Distribution Generate SBOM for internal use, ensuring proper access control, and consider tailoring content for sharing partial SBOM when distributing proprietary software or components. Validation Supplier should validate SBOM to ensure its integrity. Vulnerability & Supplier should provide a Vulnerability Exchange Document to the Exploitability consumer organization. Tools Integrate SBOM consumption with current tools like vulnerability or configuration management systems.
Version 2.0 Dated 09.07.2025 Page 31
5.3 Secure SBOM Distribution: Access Control and Public/Private SBOM To implement access control, precise terms must be defined for SBOM data integration. These terms can be established through licensing, contracts, or other existing mechanisms governing software usage and rights. Suppliers, including open-source maintainers, may prefer public SBOM data, while others might opt for confidentiality, limiting access to select users. By following these steps, organizations should implement a secure and controlled distribution of SBOM, ensuring that sensitive information is accessible only to authorized parties while maintaining transparency and trust in the software supply chain.
5.3.1 Access Control: 5.3.1.1 Define a role-based access control (RBAC) system to manage access to the
5.3.1.2 Identify the different stakeholders (e.g., developers, security teams, supply
chain partners) and their respective access requirements.
5.3.1.3 Assign appropriate permissions and privileges to each role, such as Read-only
access for general users, Edit and update access for SBOM maintainers, Restricted access for sensitive or confidential SBOM data
5.3.2 Public and Private SBOM: 5.3.2.1 Maintain two versions of the SBOM:
Public SBOM: This version contains non-sensitive information that can be
shared publicly with all stakeholders.Private SBOM: This version includes sensitive or confidential information,
such as vulnerabilities, that should be accessed only by authorized parties.
5.3.3 Secure Distribution Mechanisms: 5.3.3.1 Leverage secure communication protocols, such as HTTPS, to transfer the
SBOM data between parties.
5.3.3.2 Implement digital signatures or encryption to ensure the integrity and
confidentiality of the SBOM data.
5.3.3.3 Use secure file-sharing platforms or tools that provide access control and audit
capabilities.
5.3.4 Automated SBOM Generation and Updates:
Version 2.0 Dated 09.07.2025 Page 32
5.3.4.1 Integrate the SBOM generation process into the software development lifecycle
(SDLC) to ensure the SBOM is up-to-date and accurate.
5.3.4.2 Automate the process of updating the SBOM when changes occur in the
software components or dependencies.
5.3.5 SBOM Consumption and Verification: 5.3.5.1 Provide clear guidance and documentation on how to consume and verify the
5.3.5.2 Develop processes and tools to enable stakeholders to validate the SBOM
against their specific requirements and security policies.
5.3.6 Monitoring and Auditing: 5.3.6.1 Implement logging and auditing mechanisms to track access and changes to
the SBOM data.
5.3.6.2 Regularly review access logs and audit trails to ensure compliance with the
defined access control policies.
5.3.7 Incident Response and Remediation: 5.3.7.1 Establish incident response procedures to handle security incidents or
breaches related to the SBOM data.
5.3.7.2 Implement processes to quickly assess the impact of vulnerabilities or incidents
and coordinate remediation efforts with relevant stakeholders.
5.4 SBOM Sharing
In order to increase the transparency, security and compliance in the software supply chain it is necessary to share the SBOM among the suppliers of the software and the users. Sharing SBOM documents internally within an organization enables development, security, operations, and legal teams to gain insights into the software components and dependencies used in their projects. This promotes transparency, fosters collaboration, and facilitates compliance with licensing and security requirements. Which in turn will increase the trust among the external partners, suppliers, and vendors. SBOM provides auditable evidence of software composition, licensing, and security measures implemented within a software product or system. SBOM document sharing can be facilitated through various channels and formats, including: Version 2.0 Dated 09.07.2025 Page 33
Secure File Sharing Platforms: These platforms should provide a secure and controlled
environment for sharing SBOM documents with authorized parties.API Integration: APIs (Application Programming Interfaces) should allow for the automated
and secure exchange of SBOM data between different systems or platforms.Collaboration Tools: Collaboration tools, such as project management platforms or
document-sharing applications, can facilitate secure SBOM sharing within teams or across organizations.Industry Platforms and Repositories: Several industry-specific platforms and repositories
have been established to facilitate the sharing and dissemination of SBOM documents within particular sectors or communities. While sharing the documents it is recommended to digitally sign the document for the clients to confirm the authenticity and verify for any tampering. It is also important to identify which SBOM needs to be made public or private while sharing.
Version 2.0 Dated 09.07.2025 Page 34
Vulnerability Tracking and Analysis in SBOM
This chapter discusses vulnerability tracking and analysis using Software Bill of Materials (SBOM) Vulnerability Exploitability eXchange (VEX) and Common Security Advisory Framework (CSAF). VEX facilitates standardized sharing of vulnerability information, while CSAF provides a structured framework for describing security advisories.Design a VEX Document: The Vulnerability Exploitability eXchange (VEX) document should
be designed by the organization or entity responsible for managing the software supply chain (e.g. supplier) after a vulnerability is discovered, informing customers about the exploitability status to allow consumers to prioritize their remediation efforts. This should include a team of software developers, vendors, or organizations involved in procurement and compliance responsible for all the tracking and analysis of the vulnerability in the software. It is an iterative process and the VEX document gets updated with each update in the vulnerability including the time taken by the supplier along with remediation, workarounds, restart/downtime required, scores, and risks, the VEX document must include the following about the status of vulnerability in specific software products:
Not affected - No remediation is required regarding this vulnerability. Affected - Actions are recommended to remediate or address this vulnerability. Fixed - Represents that these product versions contain a fix for the vulnerability. Under Investigation - It is not yet known whether these product versions are affected
by the vulnerability. An update will be provided in a later release.
- Adoption of Common Security Advisory Framework (CSAF): Subsequently, after the VEX document the supplier should provide the CSAF advisory, which includes detailed information about the vulnerability, such as a description, affected product versions, severity assessment, and recommended mitigation steps. This can be understood by the following example:
Vulnerability VEX Document CSAF Advisory Discovery Publication Publication
Patch and Ongoing SBOM Mitigation Communication IntegrationInstructions
Figure 7: Vulnerability Tracking and Analysis in SBOM Steps Sequence Example
Version 2.0 Dated 09.07.2025 Page 35
The log4j vulnerability serves as an illustration to map and describe the concept outlined in the figure above.
Vulnerability Discovery: In December 2021, a critical vulnerability was discovered in
the widely used Log4j logging library.VEX Publication (1 week): Within a week, the Apache Software Foundation (the
maintainers of Log4j) published a VEX document, stating that the vulnerability was "Exploitable".CSAF Publication (3 weeks): Approximately three weeks after the initial discovery, the
Apache Software Foundation released a CSAF advisory with detailed information about the Log4j vulnerability. The CSAF advisory included a description of the vulnerability, affected versions, a CVSS score of 10.0 (critical severity), and mitigation steps.Patch/Mitigation Instructions: The CSAF advisory provided guidance for users on how
to update to a patched version of Log4j or implement other mitigations to address the vulnerability.Ongoing Updates: The Apache Software Foundation continued to monitor the situation
and provide updates as new information or additional mitigation strategies became available.SBOM Integration: Organizations that had the Log4j library included in their software
components were able to identify the affected parts of their systems by integrating the VEX and CSAF data into their SBOM. This allowed them to prioritize the remediation efforts and ensure their systems were protected against the Log4Shell vulnerability.Integration with diverse vulnerability databases and advisory: Suppliers and consumers can
integrate their SBOM data with vulnerability databases, CERT-In vulnerability notes, alerts, threat intelligence platforms and vendor-specific advisories, enabling comprehensive visibility into their software's security posture. Suppliers directly integrate SBOM data to map components to known vulnerabilities, then provide the enhanced SBOM to customers. Consumers leverage APIs, data feeds, or manual processes to integrate SBOM with vulnerability data, allowing them to identify and prioritize remediation. Version 2.0 Dated 09.07.2025 Page 36Implement shift-left approach and vulnerability scanning: Suppliers should implement shift-
left vulnerability scanning by integrating security tools into their software development pipeline. This involves automatically analyzing the SBOM data to identify vulnerabilities in the software components during the early stages of the SDLC, such as the build and packaging phases. Version 2.0 Dated 09.07.2025 Page 37Recommendations and Best Practices
This chapter delves into practical recommendations and best practices for effectively managing SBOM to enhance software supply chain security.
7.1 Recommendations
7.1.1 All the government, public sector, essential services organizations and organizations
involved with software exports and software services industry should include requirements for SBOM in all their software and solutions Purchase/Procurement.
7.1.2 All software supplied to the government; public sector & essential services
organizations/departments must be accompanied by a complete SBOM.
7.1.3 All government, public sector and essential services organizations/departments must
ensure to maintain SBOM of the software being used, procured and developed.
7.1.4 The SBOM of the software supplied to the government and public sector
organizations/departments must include the data fields mentioned in Chapter 4, section 4.2 of this document.
7.1.5 The format to generate the SBOM of the software supplied to government and public
sector organizations/departments should be Software Package Data eXchange (SPDX) or CycloneDX.
7.1.6 The software developer/integrator organization that supplies software to government and
public sector organizations/departments should design a Vulnerability Exploitability eXchange (VEX) after a vulnerability is discovered informing customers about the exploitability status to allow consumers to prioritize their remediation efforts. The VEX document must include the following about the status of vulnerability in specific software products:
Not affected - No remediation is required regarding this vulnerability. Affected - Actions are recommended to remediate or address this vulnerability. Fixed - Represents that these product versions contain a fix for the vulnerability. Under Investigation - It is not yet known whether these product versions are affected
by the vulnerability. An update will be provided in a later release. Version 2.0 Dated 09.07.2025 Page 38
Subsequently, after the VEX document, the supplier should provide the CSAF advisory, which includes detailed information about the vulnerability, such as a description, affected product versions, severity assessment, recommended mitigation steps etc.
7.1.7 Software Developer/Consumer/Integrator organizations should integrate their SBOM
data with vulnerability databases, CERT-In vulnerability notes, alerts, threat intelligence platforms and vendor-specific advisories, enabling comprehensive visibility into their software's security posture.
7.1.8 Consumer organizations should update their own SBOM to reflect applied patches or
mitigations.
7.1.9 A separate SBOM for each software version, updating it only when additional component
information is provided or SBOM errors are corrected.
7.1.10 The consumer organizations (especially the government and public sector organisations)
should map and develop an internal SBOM on the basis of the SBOM provided by the supplier.
7.1.11 Security teams of Software consumer organizations should include SBOM inventory in
the workflow of vulnerability management.
7.1.12 Regular audits and assessments of SBOM processes should be conducted to ensure
accuracy and completeness.
7.1.13 Consumer organizations should combine component data from SBOM with vulnerability
status information from VEXes to provide an up-to-date view of the status of vulnerabilities to enable a targeted approach to identifying and addressing software vulnerabilities.
7.1.14 It should be ensured the SBOM data is stored and transmitted securely, using encryption,
access controls, and other security measures to protect the sensitive information.
7.1.15 Establish workflows to regularly update the SBOM as new software components are
introduced or existing ones are updated.
Version 2.0 Dated 09.07.2025 Page 39
7.2 Best Practices
7.2.1 Ensure the SBOM captures detailed metadata, such as component names, versions,
licenses, and unique identifiers.
7.2.2 Integrate SBOM generation into the secure software development lifecycle (SSDLC) &
CI/CD pipelines to maintain the SBOM's accuracy and timeliness
7.2.3 Implement risk-based approaches to prioritize the remediation of vulnerabilities based on
factors like severity, exploitability, and potential business impact.
7.2.4 Establish clear policies and procedures for the handling, sharing, and distribution of the
7.2.5 The SBOM data should be generated in such a way that it can be utilized to demonstrate
compliance and fulfil regulatory reporting obligations related to software supply chain security.
7.2.6 Implement alerting systems to promptly notify relevant stakeholders about critical security
events, enabling timely remediation.
7.2.7 Develop detailed playbooks for responding to security incidents and managing the
remediation of vulnerabilities identified through the SBOM analysis.
7.2.8 Adopt a zero-trust security model to verify every user and device trying to connect to the
network, enhancing security by eliminating implicit trust assumptions.
7.2.9 Implement Multi Factor Authentication (MFA) mechanisms to add an extra layer of
security, reducing the risk of unauthorized access to systems and data.
7.2.10 Conduct periodic vulnerability assessments and measurements to identify and address
security weaknesses promptly.
7.2.11 Implement continuous monitoring of software components and dependencies to detect
vulnerabilities and address them promptly.
7.2.12 Obtain assurances from third-party software vendors and suppliers regarding the
accuracy, completeness, and timeliness of SBOM provided, and establish contractual agreements to ensure compliance with SBOM requirements.
7.2.13 Perform thorough analysis to ensure that the licenses of all software components within
an application or software are compatible with each other. Identify any conflicts or restrictions that may arise from combining different licensed components. Version 2.0 Dated 09.07.2025 Page 40
7.2.14 Ensure the provision and regular updating of VEX documents alongside CSAF-based
advisories with any changes, additions, or updates made to the SBOM.
7.2.15 Provide comprehensive training and awareness programs to educate employees, from
developers to security teams, on the importance of SBOM and its role in enhancing software supply chain security.
7.2.16 If the primary component relies on multiple instances with varying meta-information, each
instance must be listed separately with its individual meta-information. Version 2.0 Dated 09.07.2025 Page 41
- Quantum BOM (QBOM) & Cryptographic BOM (CBOM) 8.1 What is Crypto & Quantum BOM?
A Quantum Bill of Materials (QBOM) and a Cryptographic Bill of Materials (CBOM) are structured inventories that provide comprehensive visibility into an organization's cryptographic and quantum-related components. The QBOM focuses on components related to quantum computing and quantum-safe cryptography. It includes quantum algorithms, security frameworks, and related technologies, enabling organizations to maintain integrity, compliance, and resilience as they adopt post- quantum cryptographic (PQC) solutions. The CBOM is an inventory of cryptographic assets--including algorithms, keys, protocols, certificates, and dependencies--capturing critical metadata such as usage patterns and expiration dates. It supports effective discovery, management, and reporting of cryptographic components, ensuring transparency and up-to-date security measures. Together, CBOM and QBOM form the foundation for transitioning to quantum-safe systems. While CBOM facilitates the adoption of quantum-resistant algorithms, QBOM ensures ongoing security and compliance in the quantum era. These inventories empower organizations with the visibility and control required to future-proof their security posture against emerging quantum threats.
8.2 Benefits of Quantum and Crypto BOM
Together, the Quantum Bill of Materials (QBOM) and Cryptographic Bill of Materials (CBOM) form a unified foundation for securing cryptographic systems across classical and quantum domains. By providing complete visibility into both traditional and quantum cryptographic components, QBOM and CBOM jointly enable the following key benefits:
8.2.1 Unified Management of Cryptographic Assets
CBOM and QBOM together offer a comprehensive framework for cataloguing cryptographic and quantum components--such as algorithms, keys, protocols, Version 2.0 Dated 09.07.2025 Page 42
certificates, hardware, and software libraries--along with critical metadata like versioning, usage, and expiration. This unified inventory enables proactive monitoring, simplified audits, and adherence to evolving security and compliance requirements.
8.2.2 Early Detection of Cryptographic Weaknesses
By analysing data from both BOMs, organizations can identify outdated, misconfigured, or vulnerable cryptographic elements across classical and quantum systems. This joint visibility supports timely remediation, reduces exposure to known threats, and strengthens overall cryptographic hygiene.
8.2.3 Transition to Post-Quantum Cryptography (PQC)
CBOM and QBOM jointly enable organizations to assess their readiness for post- quantum security by identifying dependencies on vulnerable legacy algorithms and mapping paths to adopt quantum-safe alternatives. This supports planning, prioritization, and phased migration toward PQC compliance.
8.2.4 Protection Against Quantum-Era Cyber Threats
The combined inventories help organizations prepare for quantum threats by ensuring that both existing and emerging cryptographic systems are tracked, assessed, and updated in line with quantum-resistant standards. This dual-layer visibility is critical for defending against quantum-enabled attacks.
8.2.5 End-to-End Supply Chain Security
CBOM and QBOM together allow organizations to monitor cryptographic and quantum components across the full supply chain--covering internal deployments and third-party integrations. This reduces the risk of compromised or non-compliant components entering critical systems and ensures enforcement of quantum-safe practices across vendors. Version 2.0 Dated 09.07.2025 Page 43
8.2.6 Enhanced Cyber Resilience and Risk Management
With holistic insights, organizations can better identify systemic weaknesses, track cryptographic dependencies, and model potential attack surfaces. This comprehensive perspective strengthens risk management strategies and supports proactive defence against both current and emerging threats.
8.2.7 Strengthened Incident Response and Threat Intelligence
A combined CBOM and QBOM framework equips security teams with the information needed to rapidly identify affected cryptographic or quantum components during cyber incidents. It enhances incident response effectiveness and enables more accurate quantum threat modelling and intelligence gathering.
8.3 Minimum elements of QBOM & CBOM
Table 8: Minimum Elements of QBOM & CBOM Elements of QBOM
Provides a unique identifier for the quantum device or Model Name system, ensuring easy reference and distinction. Tracks version numbers and updates, including new Version features, security patches, and system enhancements to ensure the latest advancements and fixes are in place. Records the manufacturer and origin of the quantum Vendor & Origin device, ensuring clarity in vendor communication, support, and maintenance. Documents the licensing terms and conditions for the License Information quantum device, ensuring compliance with legal, regulatory, and contractual obligations. For a cryptographic asset, the minimum elements that are Cryptographic Asset to be included in the QBOM are mentioned in table 9 depending on the cryptographic asset type.
Version 2.0 Dated 09.07.2025 Page 44
Elements of QBOM
Specifies the communication protocols used by the Communication Protocol quantum device, ensuring seamless integration and compatibility with other systems in the infrastructure. Describes the hardware components that make up the quantum device, including the processor, simulators, Hardware networking components, and sensors required for quantum operations. Describes the software elements interacting with the Software Dependencies quantum hardware, including libraries, APIs, SDKs, and firmware updates. Tracks the environmental impact of the quantum system, Environmental Impact including energy consumption and other sustainability factors. Information about known security vulnerabilities or weaknesses associated with the components, including Vulnerabilities severity ratings and references to security advisories or CVE identifiers. Digital signature for the QBOM to ensure authenticity and Attestations integrity.
Table 9 : Minimum Elements pertaining to Cryptographic Asset
The name of the cryptographic algorithm or asset. For example, "AES-128-GCM" refers Name to the AES algorithm with a 128-bit key in Galois/Counter Mode (GCM). Specifies the type of cryptographic asset. For algorithms, the asset type is "algorithm". Algorithms Describes the cryptographic primitive. For Primitive "SHA512withRSA", the primitive is "signature" as it's used for digital signing. The operational mode used by the algorithm. For example, "gcm" refers to the Mode Galois/Counter Mode used with AES encryption. Version 2.0 Dated 09.07.2025 Page 45
Asset Type
The cryptographic functions supported by the asset. For example, the functions in the Crypto Functions case of "AES-128-GCM" are key generation, encryption, decryption, and authentication tag generation. The classical security level represents the strength of the cryptographic asset in terms Classical security of its resistance to attacks using classical level (non-quantum) methods. For AES-128, it's The Object Identifier (OID) is a globally unique identifier used to refer to the algorithm. It helps in distinguishing OID algorithms across different systems. For example, "2.16.840.1.101.3.4.1.6" for AES- 128-GCM, "1.2.840.113549.1.1.13" for SHA512withRSA Lists the cryptographic algorithms employed by the quantum device or system, allowing List for an assessment of its security capabilities, especially in the context of post-quantum encryption standards. The name of the key, which is a unique Name identifier for the key used in cryptographic Defines the type of cryptographic asset. For keys, the asset type is typically "key". A unique identifier for the key, such as a key id ID or reference number. The state of the key, such as whether it is state active, revoked, or expired. Keys The size of the key, typically measured in bits. For example, a 128-bit key or a 2048-bit RSA key. size
Creation Date The date when the key was created. The date when the key became operational Activation Date or was first used. The name of the cryptographic protocol, Protocols Name such as TLS, IPsec, or SSH Version 2.0 Dated 09.07.2025 Page 46
Asset Type 128 bits. operations.
Defines the type of cryptographic asset. In this case, it would be a "protocol" The version of the protocol used, such as Version TLS 1.2 or TLS 1.3. The set of cryptographic algorithms and parameters supported by the protocol for Cipher Suites tasks like encryption, key exchange, and integrity checking. The Object Identifier (OID) associated with OID the protocol, identifying its unique specifications. The name of the certificate, typically Name referring to its subject or the entity it represents (e.g., a website). Defines the type of cryptographic asset. For certificates, the asset type is "certificate". This refers to the Distinguished Name (DN) of the entity that the certificate represents. It Subject Name typically contains information about the organization, domain name The issuer is the Certificate Authority (CA) that issued and signed the certificate. This Issuer Name field contains the DN of the CA that verified and issued the certificate. This specifies the date and time from which Not Valid Before Certificates the certificate is valid. This specifies the expiration date and time of Not Valid After the certificate. The certificate becomes invalid after this timestamp. This refers to the cryptographic algorithm Signature Algorithm used to sign the certificate. It provides a Reference reference to the algorithm and its OID (Object Identifier). This points to the public key used by the Subject Public Key subject (the entity being identified in the Reference certificate). It provides a reference to the key's details, including the algorithm. Specifies the format of the certificate. Certificate Format Common formats include X.509, which is the most widely used format for certificates.
Version 2.0 Dated 09.07.2025 Page 47
Asset Type
This refers to the file extension associated Certificate with the certificate. It is commonly .crt for Extension certificates in the X.509 format.
8.4 Recommendations and Best Practices
8.4.1 Recommendations:
8.4.1.1 All government, public sector, and essential services organizations shall require a comprehensive Bill of Materials (BOM), specifically a Cryptographic BOM (CBOM) for cryptographic assets and a Quantum BOM (QBOM) for quantum systems in all related procurements, developments, and integrations. 8.4.1.2 Suppliers of software, systems, or devices involving cryptographic or quantum technologies must provide a complete CBOM and/or QBOM detailing all components, algorithms, technologies, and dependencies present in the delivered solution. 8.4.1.3 Organizations must maintain an accurate and up-to-date CBOM/QBOM for all cryptographic or quantum systems that are used, developed, or procured. 8.4.1.4 The CBOM/QBOM must include detailed transparency into cryptographic and quantum implementations, including hardware, software, algorithms, protocols, and supporting components. 8.4.1.5 BOMs shall be generated using recognized industry-standard formats, such as Software Package Data eXchange (SPDX) or CycloneDX, to ensure interoperability, consistency, and ease of integration. 8.4.1.6 Upon discovery of vulnerabilities in cryptographic or quantum components, developers and integrators must issue a Vulnerability Exploitability eXchange (VEX) document. The VEX must classify vulnerability status as:
- Not Affected - No action required.
- Affected - Recommended actions should be specified.
- Fixed - The vulnerability has been resolved in specific versions. Version 2.0 Dated 09.07.2025 Page 48
Asset Type
- Under Investigation - The issue is currently under review. 8.4.1.7 CBOM and QBOM data should be integrated with vulnerability databases, CERT-In advisories, threat intelligence platforms, and vendor bulletins to enable real-time visibility into the security posture of the system. 8.4.1.8 Consumer organizations must create an internal CBOM/QBOM aligned with the supplier's data to ensure accurate representation of deployed components and dependencies. 8.4.1.9 Security teams must incorporate CBOM/QBOM inventories into their vulnerability management workflows to enable continuous monitoring, risk assessment, and remediation planning. 8.4.1.10 Periodic audits and assessments of the CBOM/QBOM must be conducted to verify completeness, accuracy, and compliance with applicable organizational policies and regulatory requirements. 8.4.1.11 Component data from the CBOM/QBOM must be cross-referenced with the VEX status to maintain an up-to-date view of the system's vulnerability landscape and prioritize mitigation actions effectively. 8.4.1.12 CBOM/QBOM data must be stored and transmitted securely using encryption, access control, and data integrity mechanisms to protect sensitive technical and architectural information. 8.4.1.13 Established workflows must ensure that CBOM/QBOMs are updated as new components, cryptographic algorithms, or quantum technologies are introduced, or as existing components are modified or deprecated.
8.4.2 Best Practices:
8.4.2.1 Maintain Comprehensive Inventories: Maintain a single, access-controlled inventory for all cryptographic assets and quantum components. The inventory should include accurate descriptions, versioning, configurations, dependencies, and ownership metadata. Access must be limited to authorized personnel to ensure confidentiality, integrity, and accountability.
Version 2.0 Dated 09.07.2025 Page 49
8.4.2.2 Cryptographic Asset Control: Enforce rigorous cryptographic asset management practices, including the development of complete keymaps from root to leaf. Define secure storage and backup locations for encryption keys. Enforce strict TLS configurations by specifying approved cipher suites, certificate chains, and session parameters, and prohibit the use of weak or deprecated algorithms. Certificate lifecycle management should include automated issuance, rotation, and revocation tracking. 8.4.2.3 Version Control and Change Management: Implement robust version control and change management processes to track all updates and modifications to CBOMs and QBOMs. These workflows should ensure traceability, rollback capability, and integration with secure development pipelines to reflect accurate and real-time system states. 8.4.2.4 Dependency Mapping: Document both the implementation and usage of cryptographic assets. Clearly distinguish between libraries that implement cryptographic algorithms and applications that use them. This distinction enables a more accurate understanding of component interactions and impact analysis in case of vulnerabilities or updates. 8.4.2.5 Automation: Automate the generation, analysis, and compliance validation of CBOMs and QBOMs using tooling that integrates with development and deployment workflows. Incorporate threat intelligence, vulnerability feeds, and VEX (Vulnerability Exploitability eXchange) inputs to support real-time visibility into the cryptographic and quantum security posture. 8.4.2.6 Risk and Vulnerability Assessment: Conduct periodic risk assessments and cryptographic vulnerability reviews for systems involving cryptographic or quantum components. Leverage adversarial simulations, independent audits, and internal reviews. Findings and mitigations must be documented and linked within the BOM system for traceability. 8.4.2.7 Standards and Compliance Alignment: Ensure that CBOM/QBOM practices align with applicable regulatory and technical standards, including those from NIST (e.g., post-quantum cryptography standards), ETSI, and CERT-
Version 2.0 Dated 09.07.2025 Page 50
In. Regularly review guidance updates and ensure organizational policies reflect current best practices. 8.4.2.8 Timely Updates: Ensure that any additions, modifications, or deprecations of components, configurations, or cryptographic dependencies are promptly reflected in the CBOM/QBOM. Conduct scheduled reviews, at least quarterly, to verify accuracy and completeness. 8.4.2.9 Cross-Functional Collaboration: Establish collaboration across cybersecurity, engineering, legal, compliance, and vendor management teams to ensure the CBOM/QBOM lifecycle is comprehensively governed. This cross-functional approach ensures security, regulatory compliance, and contractual responsibilities are all effectively addressed.
8.5 Quantum-Readiness and Migration Strategy
8.5.1 Public key systems using RSA, ECC, Diffie-Hellman, and DSA algorithms are vulnerable to Shor's algorithm, which efficiently solves problems that are computationally hard for classical systems but trivial for quantum computers. Organizations must consider transitioning to quantum-resistant cryptographic schemes based on lattice-based, code-based, and multivariate polynomial cryptographic primitives. 8.5.2 To assess quantum readiness, organizations should adopt a risk-based approach involving cryptographic validation testing, independent security assessments, adversarial simulations, and continuous integration of threat intelligence related to quantum advancements. 8.5.3 The implementation of quantum-safe strategies should be guided by a thorough evaluation of threat exposure, technical feasibility, and the organization's risk tolerance concerning existing cryptographic dependencies that are vulnerable to quantum threats. 8.5.4 Implement tiered vendor Post-Quantum Cryptography (PQC) contractual requirements. Service providers must document all cryptographic implementations (e.g., RSA data encryption, ECC certificate management), provide quarterly migration progress reports with C-level executive attestation, establish penalty clauses for non- Version 2.0 Dated 09.07.2025 Page 51
compliance, and demonstrate quantum-safe alternatives through proof-of-concepts prior to contract renewals to ensure third-party alignment with quantum readiness goals. Version 2.0 Dated 09.07.2025 Page 52
- Artificial Intelligence Bill of Materials (AIBOM) 9.1 What is Artificial Intelligence Bill of Materials (AIBOM)?
An Artificial Intelligence Bill of Materials (AIBOM) is a comprehensive list of components used in building, training, and deploying AI models. It typically includes hardware (such as servers, sensors, and GPUs), software (AI models, frameworks, and development tools), data sources, and any other essential elements needed for AI implementation.
9.2 Benefits of AIBOM
As AI systems become more intricate, understanding their structure and supply chain is increasingly important. AIBOMs serve several key purposes: 9.2.1 Security: AIBOMs help to identify potential vulnerabilities in AI models and their components by providing a detailed breakdown of the system's parts. This enables organizations to pinpoint weak spots, implement appropriate safeguards, and proactively address potential risks before they can be exploited. AI BOM can significantly improve incident response by providing real-time insights into the status of components and materials in the supply chain. It allows for quicker identification of compromised or vulnerable components during a cyberattack. 9.2.2 Transparency: By documenting the various components, algorithms, and data sources used in AI systems, AIBOMs provide full visibility into how AI models are built and operate. This transparency fosters greater trust, ensuring that stakeholders understand the decision-making processes behind the AI and the data used to train the models, which is essential in fostering accountability. 9.2.3 Compliance: AIBOMs play a vital role in ensuring that AI systems comply with relevant regulatory requirements, industry standards, and ethical guidelines. By mapping out the components and workflows of an AI system, they help organizations demonstrate compliance with laws and regulations, such as data privacy and protection rules, and prevent potential legal or ethical violations. 9.2.4 Risk Management: AIBOMs enable organizations to better assess and manage the risks associated with AI systems by providing a clear inventory of all the technological and data-driven elements involved. By identifying dependencies and potential failure Version 2.0 Dated 09.07.2025 Page 53
points, organizations can put in place the necessary risk mitigation strategies, ensuring that AI deployments are as safe and efficient as possible.
9.3 Minimum Elements of AIBOM
Table 10: Minimum Elements of AIBOM
Model Name tracking, referencing, and discussion. The specific version of the AI model, ensuring that any Model Version updates, and version control are documented. The type of the model (e.g., text-generation, image- Model Type image-classifier). Model Developer the model. Model Licensing Apache 2.0, GPL 3.0). Software All software elements required to run the model, including third- Dependencies libraries, frameworks, OS requirements, and proprietary software. ML Models and system, documenting decision- Algorithms learning mechanisms. Model Performance accuracy, precision, recall, F1 score, etc. Metrics
Data Source proprietary datasets, publicly available datasets, real- synthetic data).
Version 2.0 Dated 09.07.2025 Page 54 The official name of the AI model, serving as a unique identifier for changes, processing, or The name of the developer or organization responsible for developing Details of the licenses for the model and any components used (e.g., party The specific machine learning models and algorithms used in the AI making processes, input handling, and Metrics for evaluating the performance of the AI model, such as The origin or source of the data used to train the model (e.g., time data,
Data Sets privacy and licensing regulations. The hardware or computing resources required to run the Hardware including processors (e.g., GPUs, TPUs), storage, and memory. Security Requirements model data and user information. Input data. Output data. Intended Usage and intended to be used. Out of Scope Uses or Usage avoided to prevent misuse or unintended consequences. Environmental Impact footprint.
Vulnerabilities identifiers. Attestations integrity.
Version 2.0 Dated 09.07.2025 Page 55 Information about the datasets used to train the model, including names, versions, formats, and limitations. Ensures compliance with model, Encryption methods and access control mechanisms used to protect The type of input the model accepts, such as text, images, or other The type of output the model generates, such as text, images, or other The specific use cases or scenarios for which the AI model is designed scenarios that the AI model is not intended for and should be The potential environmental impact of training and deploying the AI model, including energy consumption, resource use, and carbon Known security vulnerabilities or weaknesses in the components, including severity ratings and references to security advisories or CVE Digital signature for the model or AIBOM to ensure authenticity and
9.4 Recommendations and Best Practices
9.4.1 Recommendations:
9.4.1.1 All government, public sector, essential services organizations, and organizations involved in AI-driven development and services should include AIBOM requirements in all AI-related procurements and solutions. 9.4.1.2 All AI solutions supplied to government, public sector, and essential services organizations must be accompanied by AIBOM, detailing the components and dependencies within the AI system. 9.4.1.3 Government, public sector, and essential services organizations must ensure that an AIBOM is maintained for all AI systems being used, procured, and developed. 9.4.1.4 The AIBOM of AI systems supplied to government and public sector organizations must include the elements specified in this document ensuring transparency regarding the AI model's components and dependencies. 9.4.1.5 The format for generating AIBOM for AI solutions should adhere to established standards, such as Software Package Data eXchange (SPDX) or CycloneDX, ensuring compatibility and uniformity across the industry. 9.4.1.6 The AI developer/integrator organization that supplies AI solutions to government and public sector organizations should develop a Vulnerability Exploitability eXchange (VEX) for AI models after a vulnerability or security issue is discovered. This will inform stakeholders about the exploitability status, enabling prioritized response. VEX document categories should include:
Not Affected - No remediation is required. Affected - Recommended actions to address the vulnerability. Fixed - A fix is available in product versions. Under Investigation - Ongoing investigation into whether the
vulnerability affects the product.
Version 2.0 Dated 09.07.2025 Page 56
9.4.1.7 AI developer/consumer/integrator organizations should integrate their AIBOM data with vulnerability databases, CERT-In vulnerability notes, alerts, threat intelligence platforms, and vendor-specific advisories. This integration ensures real-time visibility into AI system security. 9.4.1.8 Consumer organizations (especially government and public sector bodies) should develop an internal AIBOM based on the one provided by the AI solution supplier, ensuring full alignment with the system's components and their dependencies. 9.4.1.9 Security teams in consumer organizations should incorporate AIBOM inventory into their vulnerability management workflows to ensure continuous monitoring and proactive mitigation of AI system vulnerabilities. 9.4.1.10 Regular audits and assessments of the AIBOM process should be conducted to ensure its accuracy, completeness, and compliance with organizational and regulatory standards. 9.4.1.11 Consumer organizations should combine component data from AIBOM with vulnerability status information from VEXes to provide an up-to-date view of the AI system's vulnerability landscape, enabling targeted remediation. 9.4.1.12 AIBOM data should be securely stored and transmitted using encryption, access control mechanisms, and other security measures to protect the sensitive AI model information. 9.4.1.13 Establish workflows to regularly update the AIBOM as new AI components or models are introduced, or existing ones are updated, ensuring that the AIBOM remains accurate throughout the lifecycle of the AI system.
9.4.2 Best Practices: 9.4.2.1 Maintain a Comprehensive Inventory: The first step in creating AIBOM is
to compile a comprehensive inventory of all the critical components that make up AI system. It ensures that all components and their dependencies are thoroughly accounted for, offering a clear and organized overview of AI system.
Version 2.0 Dated 09.07.2025 Page 57
9.4.2.2 Standardized Format: Use standardized formats, like CycloneDX or SPDX,
to ensure consistency and interoperability across systems.
9.4.2.3 Automate the AIBOM Generation: To improve efficiency, consider
automating the AIBOM creation process as part of model development and deployment pipelines. Automation ensures consistency and helps keep AIBOM up to date with every iteration of your models.
9.4.2.4 Foster Reproducibility: To ensure others can replicate results and verify AI
models, include detailed scripts, model weights, and configuration settings in AIBOM. This enhances reproducibility, helping others verify the accuracy of models and encouraging further collaboration.
9.4.2.5 Prioritize Critical Models: Focus your initial AIBOM efforts on the high-
priority or high-risk models within your AI system. By targeting these areas first, you'll have the greatest impact on ensuring that system is secure, compliant, and well-optimized.
9.4.2.6 Track Model Lineage: As models evolve, it's essential to maintain clear
records of their development. This includes tracking:
Model Versions Retraining Activities Modifications and Enhancements
By maintaining model lineage, a clear history of how the AI system has changed over time is provided, ensuring accountability and facilitating reproducibility. Version 2.0 Dated 09.07.2025 Page 58
- Hardware Bill of Material (HBOM) 10.1 What is HBOM?
Hardware Bill of Materials (HBOM) refers to a structured inventory of all physical components, sub-components, embedded devices, and associated materials that constitute a hardware system or product. This HBOM provides a structured inventory of hardware components including servers, networking equipment, storage devices, end-user systems, power backup solutions, and security infrastructure. In the context of cybersecurity and supply chain risk management, the HBOM is a critical element for ensuring traceability, integrity, and compliance with applicable security and procurement standards.
10.2 Benefits of HBOM
10.2.1 Supply Chain Risk Management: An HBOM offers comprehensive visibility into the
origin, authenticity, and integrity of each hardware component used in a system. This traceability helps organizations manage supply chain risks by identifying trusted suppliers and detecting counterfeit or unapproved parts. It also enables better vendor evaluation and risk-based decision-making.
10.2.2 Improved Cybersecurity Posture: Maintaining an HBOM supports the identification of
hardware components that may be vulnerable, insecure, or compromised. It allows security teams to detect malicious implants or unauthorized modifications and strengthens the overall security posture by enabling device-level integrity verification.
10.2.3 Effective Asset Lifecycle Management: With a complete HBOM, organizations can
manage hardware assets more efficiently throughout their lifecycle--from procurement and deployment to decommissioning. It helps in tracking component versions, planning for upgrades, and addressing end-of-life or unsupported hardware well in advance.
10.2.4 Integration with Software Bill of Materials (SBOM): When used in conjunction with
an SBOM, the HBOM provides holistic visibility into both hardware and software components of a system. This full-stack transparency is critical for secure system design, firmware assurance, and effective vulnerability management across all layers of technology. Version 2.0 Dated 09.07.2025 Page 59
10.2.5 Business Continuity and Operational Efficiency: An HBOM supports faster
procurement and replacement of hardware components during failures or disruptions. By knowing the exact specifications and sources of components, organizations can reduce downtime, improve spare management, and optimize maintenance operations.
10.2.6 Supports Secure-by-Design Principles: The HBOM aligns with secure-by-design
practices by ensuring that all hardware components are verified, approved, and fit for deployment in trusted environments. It contributes to establishing hardware trust anchors, which are essential in building secure architectures and systems from the ground up.
10.3 Minimum elements of HBOM
Table 11: Minimum Elements of HBOM
Product Name The common or marketing name of the hardware item. Product The specific iteration or release number of the product. Version Product Key specifications and features that describe the hardware. Details Warranty/AMC maintenance contract. Manufacturer Name hardware.
Manufacturer The geographical address of the product's manufacturer. Location
The specific date when the product was produced. Date
Version 2.0 Dated 09.07.2025 Page 60 Information regarding the product's guarantee and any annual The name of the company responsible for producing the Manufacturing
Supplier Details about the company that provided or sold the product Supplier The geographical address of the product's supplier. Location Model Number design. Serial Number for tracking. Technical Specification of the component (e.g., voltage, frequency, capacity). Supplier component to the manufacturer of the larger product. Supplier Location the component. Technology Node indicating its feature size and generation. Compliance (e.g., RoHS, CE). Details about the component's power Power supply voltage, current, and wattage. License the component. Test Result status. Sub- component be listed with similar detailed attributes. Version 2.0 Dated 09.07.2025 Page 61 A specific alphanumeric identifier for a particular product A unique identifier assigned to each individual unit of a product Detailed technical characteristics and performance parameters The name and contact details of the company that supplied the The geographic location (city, country) of the direct supplier of For integrated circuits, this refers to the semiconductor manufacturing process technology (e.g., 7nm, 14nm), Declarations or certifications indicating adherence to relevant industry standards, regulations, or environmental directives requirements, such as Any associated intellectual property licenses or usage terms, particularly relevant for firmware or embedded software within Information about the component's performance during quality assurance or functional testing, indicating its operational This refers to the recursive nature of an HBOM; if a component itself contains further distinct hardware parts, those would also
10.4 Recommendations & Best Practices
10.4.1 Recommendations 10.4.1.1 All government, public sector, essential services organizations, and
organizations involved in manufacturing, deploying, or integrating hardware products should mandate HBOM requirements in all hardware procurement and supply contracts.
10.4.1.2 All hardware supplied to government, public sector, and essential services
organizations must be accompanied by a complete and accurate HBOM that details all critical hardware components and subcomponents.
10.4.1.3 Government, public sector, and essential services organizations must
maintain HBOMs for all hardware systems in use, including those procured externally or developed in-house, to support effective asset management and risk assessment.
10.4.1.4 The HBOM accompanying hardware supplied to government and public
sector entities must include data fields such as manufacturer name, model number, component version, firmware version, origin, criticality rating, and associated vulnerabilities.
10.4.1.5 Hardware vendors and integrators must provide a Vulnerability Exploitability Exchange (VEX) or equivalent hardware vulnerability
statement when a component vulnerability is discovered. This should include: •Not affected - The hardware is not impacted by the identified vulnerability. •Affected - The hardware is vulnerable and needs mitigation. •Fixed - The vulnerability has been addressed in updated hardware/firmware versions. •Under Investigation - Evaluation is ongoing; updates to follow. Subsequently, a CSAF advisory should be provided with detailed technical information, severity, mitigations, and impact assessment.
10.4.1.6 The recommended formats to generate HBOMs should align with structured
and machine-readable standards, preferably using extended SBOM formats
Version 2.0 Dated 09.07.2025 Page 62
like CycloneDX or custom XML/JSON schemas based on organizational needs.
10.4.1.7 Organizations involved in hardware design, supply, or consumption should
integrate HBOM data with hardware-focused vulnerability databases, CERT- In vulnerability notes, firmware advisories, and threat intelligence platforms to enable holistic supply chain visibility.
10.4.1.8 Consumer organizations must update their internal HBOMs to reflect any
patching, component replacement, or firmware updates applied to the hardware.
10.4.1.9 A separate HBOM must be maintained for each hardware version or model.
Updates should be made only when new component information is available or corrections are necessary.
10.4.1.10 Consumer organizations (especially in the government and public sector)
should create an internal HBOM based on the one provided by the supplier, enriched with asset-specific details.
10.4.1.11 Security teams of hardware-consuming organizations should incorporate
HBOM inventory into their asset management and vulnerability management workflows.
10.4.1.12 Periodic audits and assessments should be conducted to ensure HBOM
accuracy, completeness, and traceability across the hardware lifecycle.
10.4.1.13 Organizations should correlate HBOM data with vulnerability intelligence
(from VEX/CSAF or firmware CVEs) to continuously assess and prioritize hardware-related risk exposure.
10.4.1.14 HBOM data must be securely stored and transmitted using encryption,
access controls, and data integrity mechanisms to prevent tampering or unauthorized access.
10.4.1.15 Workflows must be established to routinely update HBOMs as new
components are added, replaced, or modified during the lifecycle of the hardware system.
Version 2.0 Dated 09.07.2025 Page 63
10.4.2 Best Practices 10.4.2.1 Include Metadata for each Component: Effective supply chain management
is crucial for maintaining security and compliance. It enables precise vulnerability tracking, which is vital for promptly addressing issues like compromised firmware versions. Furthermore, robust supply chain practices support compliance with national import/export or security regulations, ensuring legal and secure international trade. Finally, such vigilance allows security teams to thoroughly assess risks tied to manufacturing origins, especially concerning geopolitically sensitive areas, thereby mitigating potential threats to the integrity and reliability of components.
10.4.2.2 Maintain Version Control & Change Logs: Establishing thorough component
tracking ensures traceability in the event of an incident, supports forensic analysis should a malicious component be discovered, and allows for regulatory audits and validation of declared hardware.
10.4.2.3 Ensure Data Confidentiality and Access Control: HBOMs contain highly
sensitive information regarding product design, making their protection crucial for preventing supply chain attacks that could arise from insider threats or third-party compromises. By diligently managing and securing HBOMs, organizations can significantly reduce their vulnerability to such attacks, thereby ensuring compliance with intellectual property protection and various cyber laws.
10.4.2.4 Conduct Regular Audits and Validation: Implementing advanced component
analysis is crucial for several reasons: it detects hidden or undeclared components, thereby uncovering potential supply chain backdoors; it validates trust in third-party suppliers by verifying the authenticity and integrity of their provided parts; and ultimately, it enables regulatory or contractual enforcement by providing verifiable proof of compliance or deviation.
10.4.2.5 Automate HBOM Generation: Automating the process of generating and
maintaining HBOMs offers significant advantages. It reduces human error, ensuring accuracy and consistency. Furthermore, it keeps HBOMs up-to-date with actual production builds, eliminating discrepancies between Version 2.0 Dated 09.07.2025 Page 64
documentation and physical products. Ultimately, this automation saves considerable time and effort in documentation and audit readiness, streamlining operations and improving compliance.
10.4.2.6 Track Provenance and Supply Chain Risk: Implementing robust component
verification processes offers several key benefits. Primarily, it prevents the use of counterfeit or unauthorized components, safeguarding product quality and integrity. Additionally, such processes help identify potential vendor lock- in or critical dependencies within the supply chain, allowing for proactive mitigation strategies. Finally, they support comprehensive supplier risk scoring, encompassing factors like geopolitical stability, financial health, and cybersecurity posture, leading to a more resilient and secure supply chain.
Version 2.0 Dated 09.07.2025 Page 65
Named provisions
Related changes
Get daily alerts for India CERT-In Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-In.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when India CERT-In Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.