{"id":2670,"date":"2025-09-05T04:52:11","date_gmt":"2025-09-05T04:52:11","guid":{"rendered":"http:\/\/ft365.org\/index.php\/2025\/09\/05\/us-and-14-allies-release-joint-guidance-on-software-bill-of-materials\/"},"modified":"2025-09-05T04:52:11","modified_gmt":"2025-09-05T04:52:11","slug":"us-and-14-allies-release-joint-guidance-on-software-bill-of-materials","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/09\/05\/us-and-14-allies-release-joint-guidance-on-software-bill-of-materials\/","title":{"rendered":"US and 14 Allies Release Joint Guidance on Software Bill of Materials"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-066966f3-b695-415e-9b12-e8df53ad7b5b\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>In a landmark collaboration, cybersecurity and intelligence agencies from 15 countries have aligned on a shared vision for Software Bills of Materials (SBOMs), issuing new joint guidance to strengthen global supply chain security.<\/p>\n<p>The document, titled &#8220;<em>A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity<\/em>,&#8221; was published on September 3.<\/p>\n<p>It was signed by 21 government agencies from 15 countries, including the US Cybersecurity and Infrastructure Security Agency (CISA) and the NSA.<\/p>\n<p>It outlines key terms and concepts related to SBOMs, including a common definition of what an SBOM is, the value proposition of SBOMs, and how to implement them.<\/p>\n<\/p><\/div>\n<figure id=\"layout-7e1b1a17-51b5-4537-b2d9-66846e37535c\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/localimages\/8a29533a-644b-4e28-ad8b-42a5a42527ba.png\" alt=\"Source: \u201cA Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity\u201d \/ US Cybersecurity and Infrastructure Security Agency (CISA)\"><figcaption>Source: \u201cA Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity\u201d \/ US Cybersecurity and Infrastructure Security Agency (CISA)<\/figcaption><\/figure>\n<div id=\"layout-c0df6440-09ba-4be6-98d2-e679fc38483c\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<p>It describes the roles of SBOM producers, end-users (referred to as \u201cchoosers\u201d in the document), operators and national cybersecurity organizations.<\/p>\n<p>Additionally, the guidance encourages widespread SBOM adoption\u00a0across sectors and borders, harmonized technical implementations\u00a0to reduce complexity and cost and integration of SBOMs into security workflows\u00a0for better risk management.<\/p>\n<\/p><\/div>\n<figure id=\"layout-a7f963d7-cbd5-48f0-b7be-c1eabd6e9d5e\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"3\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/localimages\/5f8aa08a-2de0-4e83-9b1a-a715e516475e.png\" alt=\"Source: \u201cA Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity\u201d \/ US Cybersecurity and Infrastructure Security Agency (CISA)\"><figcaption>Source: \u201cA Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity\u201d \/ US Cybersecurity and Infrastructure Security Agency (CISA)<\/figcaption><\/figure>\n<div id=\"layout-49ebdcbc-c55b-4b02-bfa8-c8684b69cbda\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"4\">\n<p>\u201cThis milestone reflects a growing international consensus on the importance of software transparency in securing the digital supply chain,\u201d a CISA spokesperson commented.<\/p>\n<p>Luk\u00e1\u0161 Kintr, director of the Czech National Cyber and Information Security Agency (N\u00daKIB), one of the signatories, emphasized the increasing complexity of software that organizations must face.<\/p>\n<p>\u201cToday\u2019s software often consists of hundreds of components originating from various sources and libraries. SBOM brings essential transparency into this complex environment and clearly shows what the software is made of. I regard SBOM as a key step toward creating truly secure and resilient software \u2013 already from its design,\u201d he said.<\/p>\n<p>Nobutaka Takeo, director of the Cybersecurity Division at the Japanese Ministry of Economy, Trade and Industry\u2019s (METI) Commerce and Information Policy Bureau, stated: \u201cWe are pleased to see that the importance of SBOM is being internationally recognized through this guideline. Last year, Japan released SBOM Guidance 2.0, and we will continue to raise awareness of SBOM among relevant stakeholders while actively contributing to international discussions on the topic.&#8221;\u00a0<\/p>\n<h2><strong>Working Towards SBOM Harmonization and Legislation<\/strong><\/h2>\n<p>Allan Friedman, who led CISA\u2019s SBOM efforts between August 2021 and July 2025, welcomed the publication of the joint guidance.<\/p>\n<p>In a LinkedIn post, he emphasized that it was \u201cthe largest number of organizations that have ever joined CISA in an international document.\u201d<\/p>\n<p>\u201cThere is nothing here ground-breaking, but it&#8217;s great to have such broad input from so many countries,\u201d he added, before suggesting further steps are still needed, including the harmonization of technical implementations.<\/p>\n<p>\u201cDivergent implementations could hinder widespread adoption and sustainable implementation of SBOM. An aligned and coordinated approach to SBOM will improve effectiveness while reducing costs and complexities,\u201d he said.<\/p>\n<\/p><\/div>\n<figure id=\"layout-9bbb92c4-14e9-47a6-ac7d-e7eee25d32ef\" data-layout-id=\"8\" data-edit-folder-name=\"embed\" data-index=\"5\"><\/figure>\n<div id=\"layout-f39db2d5-566c-47fd-b127-9051a619a814\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"6\">\n<p>Speaking to <em>Infosecurity<\/em>, Josh Bressers, VP of security at Anchore and leader of the OpenSSF SBOM Everywhere working group, described the effort as a \u201cgreat\u201d initiative.<\/p>\n<div>\n<p>Nevertheless, he corroborated Friedman\u2019s view, stating that this high-level agreement is only \u201cthe logical first step to see a global adoption of software transparency through SBOMs.\u201d<\/p>\n<p> Bressers\u2019 wish for the next step is to see common legislation and guidance on software supply chain security between the signatory countries.<\/p>\n<p> \u201cMost producers operate on a global stage now, [regulations] like the EU\u2019s Cyber Resilience Act (CRA) are going to affect a huge number of companies. No doubt other countries will create similar guidance. If we don&#8217;t have a common vision, it&#8217;s going to be very difficult to meet all the requirements,\u201d he concluded.<\/p>\n<\/div>\n<p>Alongside CISA, the NSA, N\u00daKIB and METI, signatory organizations included:<\/p>\n<ul>\n<li>The Australian Signals Directorate\u2019s Australian Cyber Security Centre (ASD\u2019s ACSC)<\/li>\n<li>The Canadian Centre for Cyber Security (Cyber Centre)<\/li>\n<li>The French Cybersecurity Agency (ANSSI)<\/li>\n<li>Germany\u2019s Federal Office for Information Security (BSI)<\/li>\n<li>The Indian Computer Emergency Response Team (CERT-In)<\/li>\n<li>Italy\u2019s National Cybersecurity Agency (ACN)<\/li>\n<li>Japan\u2019s National Cybersecurity Office (NCO)<\/li>\n<li>The Netherlands\u2019 National Cyber Security Centre (NCSC-NL)<\/li>\n<li>New Zealand\u2019s National Cyber Security Centre (NCSC-NZ)<\/li>\n<li>Poland\u2019s Research and Academic Computer Network (NASK)<\/li>\n<li>The Cyber Security Agency of Singapore (CSA)<\/li>\n<li>Slovakia\u2019s National Security Authority (NB\u00da)<\/li>\n<li>South Korea\u2019s National Intelligence Service\/National Cyber Security Center (NIS\/NCSC) and the Korean Internet and Security Agency (KISA)<\/li>\n<\/ul>\n<p><em>Read more: CISA Seeks Biden Era&#8217;s SBOM Minimum Requirements Guideline Change<\/em><\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a landmark collaboration, cybersecurity and intelligence agencies from 15 countries have aligned on a shared vision for Software Bills of Materials (SBOMs), issuing new joint guidance to strengthen global supply chain security. The document, titled &#8220;A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity,&#8221; was published on September 3. It was signed<\/p>\n","protected":false},"author":2,"featured_media":2671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/09\/2670-1e076e05-59a3-42fd-8428-6f2d24347fe5-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=2670"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2670\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/2671"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=2670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=2670"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=2670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}