Regulation (EU) 2023/1230 on machinery (consolidated 29 June 2023, 126 pages). Replaces Directive 2006/42/EC. Applies generally from 20 January 2027. The text does not explicitly mention SBOM, Software Bill of Materials, CycloneDX, SPDX, or VEX. Classification is Implicit because the regulation treats safety-critical software as a first-class object with transparency and identification requirements.
No explicit vulnerability disclosure process, timelines, or patch mandates. Classification is Implicit because cybersecurity-adjacent integrity requirements apply to safety-critical software.
No specific disclosure hours mandated.
DRAFT amendment to IEC 62443-4-2:2019 (Technical Security Requirements for IACS Components). Being developed to align IACS component cybersecurity with the EU Cyber Resilience Act, giving manufacturers a standards-based path to CRA compliance and market access.
DRAFT amendment. Expands component-level vulnerability-management testing to support CRA compliance.
DRAFT amendment to IEC 62443-4-1:2018 (Secure Product Development Lifecycle for IACS). Being developed to align IACS development practices with the EU Cyber Resilience Act so manufacturers have a standards-based path to CRA compliance and market access.
DRAFT amendment. Ties IACS vulnerability handling to SBOM-driven component visibility and aligns with EU CRA Article 14 reporting obligations.
EU Cyber Resilience Act (Regulation 2024/2847) mandates SBOM as an Annex I essential requirement for products with digital elements. Full application date: 11 December 2027.
EU CRA vulnerability management obligations include 24h/72h/14-day notification of actively exploited vulnerabilities to ENISA and mandatory coordinated vulnerability disclosure.
EU AI Act (Regulation (EU) 2024/1689) establishes horizontal rules for AI systems placed on the EU market. The Act does not name "AIBOM" but its technical-documentation requirements in Annex IV align closely with emerging SPDX 3.0 AIBOM and CycloneDX ML-BOM specifications — research (Frontiers, 2026) shows SPDX 3.0 AIBOM satisfies 13 of 14 Annex IV obligations. High-risk AI providers must document datasets, model training, and software components. Main application date: 2 August 2026 (prohibitions from 2 February 2025; general-purpose AI from 2 August 2025).
AI Act vulnerability management focuses on robustness, cybersecurity, and post-market incident reporting for high-risk AI systems. Article 73 sets incident-reporting timelines to national market-surveillance authorities.
FDA guidance (Feb 2026) requires machine-readable SBOM per FD&C Act §524B(b)(3) for all cyber devices. FDA may issue Refuse to Accept (RTA) for missing SBOM.
Companion reading: MITRE Cybersecurity Risk Analysis for Medical Devices in the Era of Evolving Technologies (April 2026) extends SBOM scope to cloud, AI/ML, and cryptographic components.
FDA guidance requires security risk management, cybersecurity testing, coordinated vulnerability disclosure, and postmarket monitoring throughout the device lifecycle.
OMB Memorandum M-26-05 (23 Jan 2026) moves federal cybersecurity to risk-based contractual approach. Rescinds M-22-18 and M-23-16.
OMB M-26-05 transitions from mandatory attestation to risk-based determination of software/hardware security requirements.
GB 44495-2024 (China, in force 1 Jan 2026) is a mandatory vehicle cybersecurity standard. Software supply-chain visibility is a component of vehicle cybersecurity management.
GB 44495-2024 requires vehicle cybersecurity management, risk assessment across lifecycle, vulnerability management, and type-approval conformity.
Commission Implementing Regulation (EU) 2025/2392 specifies technical descriptions of CRA-important and CRA-critical product categories (Annex III, IV).
This Implementing Regulation is a scope/classification instrument. Vulnerability obligations flow through the parent CRA (2024/2847) Article 14 and Annex I Part II.
IEC 81001-5-1:2021/ISH1:2025 Interpretation Sheet 1 clarifies component handling and transparency requirements of Ed.1.0.
Note: specific interpretation content not reproduced due to IEC copyright.
Interpretation Sheet 1 clarifies vulnerability management boundaries and security update processes in IEC 81001-5-1 Ed.1.0.
ACSC Information Security Manual: Guidelines for Software Development (Jun 2025). Australian cybersecurity controls for software development lifecycle and supply-chain.
ACSC ISM mandates application testing, web vulnerability controls, coordinated vulnerability disclosure, and change-management security reviews.
NIAP Policy Letter #30 (signed 12 May 2025) mandates SBOMs in NIAP Common Criteria evaluations.
Addendum 1 (SBOM Field Table Mapping v2.0, 19 Dec 2025): adapts NTIA minimum elements to 14 required fields using SPDX v3.0.1 or CycloneDX v1.6.
Policy 30 ties SBOM content directly into NIAP vulnerability triage. No explicit vulnerability disclosure timelines are set.
SEBI CSCRF mandates SBOM for SEBI Regulated Entities as part of software supply-chain security and asset inventory. Effective from 1 April 2025 for regulated entities.
SEBI CSCRF requires continuous monitoring, 6-hour incident reporting, annual penetration testing, and severity-based vulnerability remediation timelines.
US BIS Rule on Securing the ICTS Supply Chain: Connected Vehicles (15 CFR Part 791). Applies to software in vehicle connectivity systems (VCS) and automated driving systems (ADS) from foreign-adversary countries.
BIS rule establishes licensing, reporting, and annual declaration obligations for prohibited transactions involving foreign-adversary components.
European Cybersecurity Certification Scheme on Common Criteria (EUCC) establishes a voluntary EU-wide certification scheme. SBOM is a recommended practice for certificate holders.
EUCC requires vulnerability handling and disclosure obligations from certificate holders. Continuous compliance monitoring is mandatory for maintained certificates.
EN 18031-3:2024 defines cybersecurity requirements for radio equipment handling virtual money or monetary value under RED Art. 3(3)(f). Harmonised via Commission Implementing Decision 2025/138. No explicit SBOM; secure updates and financial-asset protection imply component tracking.
EN 18031-3 mandates VMP alongside strict financial-asset protection, secure update, and authentication for monetary-value equipment.
EN 18031-2:2024 defines cybersecurity and data-protection requirements for radio equipment processing personal, traffic, or location data (wearables, smart toys, childcare equipment) under RED Art. 3(3)(e). Harmonised via Commission Implementing Decision 2025/138. No explicit SBOM; secure updates imply component tracking.
EN 18031-2 mandates VMP (vulnerability management procedures) with additional privacy-focused mechanisms for equipment processing personal, traffic, or location data.
EN 18031-1:2024 defines cybersecurity requirements for internet-connected radio equipment under RED Art. 3(3)(d). Harmonised per Commission Implementing Decision 2025/138. No explicit SBOM; secure update mechanisms and vulnerability handling imply component visibility.
EN 18031-1 includes explicit vulnerability management procedures (VMP) as a mandatory cybersecurity requirement for internet-connected radio equipment.
Commission Implementing Decision (EU) 2025/138 adds the EN 18031 series as harmonised standards for RED cybersecurity requirements under Delegated Reg 2022/30.
The Implementing Decision publishes restrictions on certain clauses of EN 18031 standards. Vulnerability handling is defined by the EN 18031 standards themselves.
EO 14144 (Biden, Jan 2025) extended EO 14028 with tighter software supply-chain transparency requirements. The EO did not explicitly name "SBOM" but required software providers to submit machine-readable attestations and supporting artifacts to CISA's Repository for Software Attestation and Artifacts (RSAA), where SBOM serves as the primary implicit artifact. Sections 2(a) and 2(b) were rescinded in June 2025 by the "Sustaining Select Efforts" amending EO; federal software-security direction shifted to OMB M-26-05 (Jan 2026).
EO 14144 addressed identity and credentials, federal communications hardening, AI cybersecurity, and acquisition alignment. Sections 2(a), 2(b) and several others were rescinded in June 2025 by the "Sustaining Select Efforts" amending EO.
Australia SOCI Amendment Act 2024 (C2024A00100) strengthens critical-infrastructure risk management, data storage, and telecom security. SBOM not explicit; supply-chain risk is implicit.
SOCI Amendment expands incident response, systems-of-national-significance declarations, and telecom security obligations (from 4 Apr 2025).
Australia SOCI Amendment Act 2024 (C2024A00100) strengthens critical-infrastructure risk management, data storage, and telecom security. SBOM not explicit; supply-chain risk is implicit.
SOCI Amendment expands incident response, systems-of-national-significance declarations, and telecom security obligations (from 4 Apr 2025).
Australia Cyber Security Act 2024 (C2024A00098) includes smart device security standards. SBOM is not explicitly mandated; supply-chain visibility underlies critical-infrastructure risk obligations.
Australia Cyber Security Act mandates 72-hour ransomware payment reporting and establishes the incident response framework and Cyber Incident Review Board.
NIS 2 Directive (EU) 2022/2555 mandates supply-chain security and secure-development practices for essential and important entities. Member-state application date: 18 October 2024.
NIS 2 incident reporting follows the 24h/72h/1-month cadence. Includes coordinated vulnerability disclosure framework with European vulnerability database at ENISA.
NERC CIP-013-3 mandates supply-chain cybersecurity risk management for BES entities, including vendor software integrity and authenticity verification.
NERC CIP-013-3 requires processes for vendor vulnerability notification, incident coordination, and remote access controls.
U.S. Army ASA(ALT) SBOM Policy Memorandum (16 Aug 2024) implements SBOM policy across all Army acquisition pathways.
Army memo requires continuous SBOM monitoring for vulnerabilities and integration with RMF/ATO processes.
EU Delegated Regulation 2022/30 activates RED cybersecurity essential requirements. SBOM is not mandated directly; compliance via EN 18031 standards drives component visibility.
EU Delegated Regulation 2022/30 is an activating instrument. Vulnerability handling obligations arise through EN 18031 harmonised standards referenced by Implementing Decision 2025/138.
FCC Report and Order and Further Notice of Proposed Rulemaking, "Cybersecurity Labeling for Internet of Things" (PS Docket No. 23-239, FCC 24-26, 125 pages). Adopted 14 March 2024, released 15 March 2024, published in Federal Register 30 July 2024. Establishes a voluntary U.S. Cyber Trust Mark labeling program for wireless consumer IoT products based on NISTIR 8425 (IoT Core Baseline for Consumer Products).
ioXt Alliance named Lead Administrator effective 13 April 2026.
Explicit vulnerability management commitments required of applicants:
Program is voluntary; no specific disclosure hours mandated in the rule itself.
PCI DSS v4.0.1 (PCI SSC, June 2024) requires an inventory of bespoke/custom and third-party software components (6.3.2), enforceable after 31 March 2025. Functions as an SBOM equivalent; the standard does not use the term "SBOM" explicitly.
PCI DSS v4.0.1 vulnerability management spans Requirements 6 (patching) and 11 (scanning). Internal quarterly scans, external ASV quarterly scans, and critical-patch installation within one month.
Regulation (EU) 2024/1183 (eIDAS 2.0) establishes the European Digital Identity Wallet framework with cybersecurity requirements. SBOM is implicit in wallet certification.
eIDAS 2.0 requires trust service providers to notify supervisory bodies of security breaches within 24 hours. Wallet certification includes security evaluation and vulnerability response.
Swiss Financial Market Supervisory Authority circular on operational risk management for banks. 15 pages. Covers ICT risk management, cyber risk, critical data handling, outsourcing governance, and scenario based cyber risk exercises. References software assets and ICT inventory (p. 3, 8) but does not reference SBOM, software components, supply chain security, vulnerability disclosure, or any software transparency concepts. Focuses on organizational and process level operational resilience rather than software supply chain. Switzerland is not EU but placed here for European geographic proximity.
Incident reporting to FINMA within 24h (critical) or 72h (significant), penetration testing requirements, cyber risk scenario exercises
UK Telecommunications Security Code of Practice (Dec 2022). Applies to public electronic communications providers. SBOM not explicitly mandated; supply-chain security is a Section 4 measure.
UK Telecom CoP requires patch management, vulnerability response, incident reporting to Ofcom, monitoring, and governance of security operations.
NIST Guidance under EO 14028 Section 4(e) on software supply chain security (Feb 2022). Implements the SSDF and software verification practices mandated by the Executive Order.
The NIST SSSC guidance defines minimum software verification activities: code review, testing, and scanning for federal software producers.
IEC 81001-5-1 Ed.1.0 requires comprehensive software component risk assessment including SOUP/OTSS. Component tracking constitutes de facto SBOM requirement.
IEC 81001-5-1 defines vulnerability handling and security update management across the product lifecycle for health software.
ISO/SAE 21434:2021 requires distributed cybersecurity activities and supplier management, functionally encompassing SBOM practices for automotive supply chains.
ISO/SAE 21434 mandates TARA, continuous vulnerability management, and incident response across the vehicle lifecycle.
EU Medical Device Regulation (MDR, 2017/745) sets safety and cybersecurity requirements for medical devices. Software-related cybersecurity is concentrated in Annex I §17. SBOM is not named in the regulation text but becomes an implicit expectation through MDCG 2019-16 Rev.1 guidance, which treats SBOM and third-party software component documentation as state-of-the-art cybersecurity practice for CE marking. Medical devices under MDR/IVDR are excluded from the EU CRA scope (CRA Art. 2); however, associated non-device companion apps, wearables, and cloud components may still fall under CRA and its explicit SBOM mandate.
MDR post-market surveillance and serious-incident reporting operationalize cybersecurity vulnerability response for medical devices in the EU market.
EO 14028 is the first US federal order referencing SBOM explicitly. Directs NIST to publish SSSC guidance implementing software supply-chain security for federal acquisitions.
EO 14028 mandates vulnerability disclosure programs, incident detection, and zero-trust adoption across federal agencies.
Health Canada Pre-market Requirements for Medical Device Cybersecurity (Jun 2019) explicitly defines "cybersecurity Bill of Materials (BOM)" and requires it in Class III/IV licence applications.
Health Canada requires device-specific risk management, vulnerability scanning and testing, and post-market monitoring. References AAMI TIR57, UL 2900, IEC 62304, NIST CSF.
PCI SSF Secure Software Program Guide is the PCI SSC validation program for payment software. Third-party component management is a validation requirement.
PCI SSF requires vulnerability management, security update delivery, and QSA validation of payment software vendors.
ISO 26262:2018 is an automotive functional safety standard. Part 8 supporting processes include configuration management, which is adjacent to SBOM practices.
ISO 26262 is functional-safety-focused, not cybersecurity. Vulnerability management in vehicles is covered by the companion ISO/SAE 21434 standard.
FDA Postmarket Management of Cybersecurity in Medical Devices (Dec 2016) predates SBOM terminology but requires manufacturers to manage third-party components in post-market.
FDA Postmarket guidance requires a cybersecurity risk-management program, coordinated vulnerability disclosure, and FDA notification of uncontrolled vulnerabilities.
EU Radio Equipment Directive (RED) sets essential requirements for radio equipment on the EU market. Software security is not explicitly addressed; cybersecurity essentials at 3(3)(d-f) require harmonised standards (EN 18031).
RED is a conformity-assessment directive. Vulnerability handling obligations arise through harmonised standards and downstream EU regulations (CRA).
RBI Cyber Security Framework in Banks (2016) is a cybersecurity baseline for Scheduled Commercial Banks. No explicit SBOM; focus is on IT asset inventory and patch management.
RBI mandates SOC setup, continuous surveillance, penetration testing, patch management, zero-day monitoring, and incident reporting to RBI/CERT-In.
CER, UITP and UNIFE Expert Guidance on the Implementation of the CRA in Mainline and Urban Railways, v1.0.0 (April 2026). Voluntary industry guidance produced by the European rail sector — CER (Community of European Railway and Infrastructure Companies), UITP (International Association of Public Transport), and UNIFE (Association of European Rail Industry) — to support a coherent rail-sector implementation of Regulation (EU) 2024/2847 (CRA). Not legally binding; does not represent the position of EU institutions.
The guide details CRA Article 14 reporting obligations and Article 13 vulnerability-handling obligations as they apply to rail-sector products with digital elements (PDEs).
OWASP CycloneDX Authoritative Guide to AI/ML-BOM, First Edition (3 March 2026), produced by the OWASP Foundation and the CycloneDX AI/ML Working Group. ML-BOM (Machine Learning Bill of Materials) is a CycloneDX BOM document covering AI/ML systems. The CycloneDX format is ratified as ECMA-424. The guide targets transparency, compliance, and security across the AI supply chain and is written to align with the EU AI Act, the BSI G7 SBOM-for-AI position paper, and similar guidance.
The guide explicitly positions Security & Vulnerability Management as a primary use case for ML-BOM, but does not mandate timelines or set out CVD obligations.
BSI G7 SBOM-for-AI Food for Thoughts (June 2025) is a shared G7 Cybersecurity Working Group position paper on extending the SBOM concept to AI systems. The entire document is dedicated to defining SBOM for AI, its properties, and minimum elements. Not a binding regulation.
SBOM provisions:
G7 SBOM-for-AI explicitly positions vulnerability management as a primary use case but does not mandate timelines.
Vulnerability management provisions:
NIST AI RMF 1.0 (NIST AI 100-1, Jan 2023) is a voluntary, rights-preserving, non-sector-specific framework for managing AI risks. SBOM is not named explicitly. Software supply chain transparency is addressed implicitly through references to third-party software, data, and models, the Secure Software Development Framework, and the NIST Cybersecurity Framework.
SBOM-adjacent provisions:
AI RMF 1.0 addresses vulnerability management implicitly through the Secure and Resilient trustworthy characteristic and references to existing security frameworks. No specific disclosure timelines, CVD requirements, or PSIRT obligations.
Vulnerability management provisions:
MITRE discussion paper (April 2026, Public Release 26-0682) produced under HHS contract 75FCMC23D0004 as companion reading to FDA Premarket Cybersecurity Guidance. Treats SBOMs - alongside their cryptographic-asset counterpart CBOM and AI-asset counterpart AIBOM - as the primary mechanism for managing vulnerabilities across emerging technology stacks.
Discusses vulnerability management concepts without specific timelines, CVD mandates, or PSIRT obligations. Defers to FDA Premarket Cybersecurity guidance for authoritative requirements.
ENISA National Capabilities Assessment Framework 2.0 (NCAF 2.0), April 2026, 126 pages (ISBN 978-92-9204-789-4, DOI 10.2824/5812948). 2026 Edition, updated for NIS2 alignment (original NCAF published 2020). Maturity model for EU Member State governments to self-assess their National Cybersecurity Strategies (NCSSs); audience is "policymakers, subject-matter experts and government officials", not vendors.
The document does not mention SBOM, Software Bill of Materials, CycloneDX, SPDX, or VEX. Classification is Implicit via Objective 17 - "Improve the cybersecurity of the supply chain" (Cluster #4, pp. 93-94). Member States are assessed on:
This is policy-level maturity benchmarking, not vendor obligations.
Classification is Implicit via Objective 19 - "Establish a Coordinated Vulnerability Disclosure (CVD) policy" (Cluster #4, pp. 99-100). Member States are assessed on:
No vendor-level disclosure hours mandated. National-policy maturity framework, not vendor obligations.
EEI Model Procurement Contract Language Addressing Cybersecurity Supply Chain Risk (Version 3.0, October 2022). Voluntary industry contract template for US electric utilities to embed in BES Cyber System procurement contracts, supporting compliance with NERC CIP-013-1 Requirement R1.2. Not a regulation itself; the enforceable instrument is NERC CIP-013-3.
EEI Model Procurement Contract Language includes incident notification, response planning, coordinated vulnerability disclosure, and patching governance aligned with NIST SP 800-53/800-61 and ISO/IEC 30111 / 29147.
AIA Civil Aviation Cybersecurity Subcommittee recommendations on SBOM use across the civil aviation sector. Voluntary industry guidance (no enforcement) targeting government, regulators, aircraft operators, OEMs, and suppliers. Lays out a multi-phased plan for SBOM generation, distribution, and use in vulnerability management.
AIA recommends vulnerability management processes across the aviation ecosystem with aviation-specific adaptations: long product lifecycles, precautionary safety principle, and legacy product prioritization.
Auto-ISAC SBOM Informational Report v3.0 (17 Jan 2025) captures findings from the Auto-ISAC SBOM Working Group proceedings in 2023-2024 on effective practices of SBOM usage in the automotive industry. TLP:CLEAR (publicly distributable). 101 pages. Surveys SBOM projects across US, EU, and Japan governments plus industry, academia, and open source, and identifies automotive-specific SBOM considerations including complex supply chains, safety coupling, and update complexity.
Auto-ISAC SBOM-IR covers incident management and vulnerability disclosure as a core automotive SBOM use case, aligning with ISO/SAE 21434 and UNECE WP.29 R155 practices.
ENISA Technical Advisory for Secure Use of Package Managers, v1.1 (March 2026). First in a planned series of regular ENISA technical advisories on product security. Focuses on how developers can securely consume third-party packages throughout the software development lifecycle. Addresses supply-chain attack vectors including malicious packages, compromised maintainers, typosquatting, and dependency confusion. SBOM is implicit in the package-inventory and monitoring practices recommended.
The advisory structures vulnerability management around package selection, integration, monitoring, and mitigation. Covers vulnerability detection in dependencies, coordinated disclosure for package-ecosystem vulnerabilities, and mitigation approaches when vulnerable packages are discovered in a software supply chain.
CISA/NSA + 17 International Partners Shared Vision of SBOM for Cybersecurity (3 Sep 2025). SBOM-focused joint guidance endorsed by 20+ cybersecurity agencies.
Shared Vision document highlights vulnerability management as the primary SBOM use case, referencing Log4Shell as case study.
Multi-organization global standard (Cisco, BSI, Red Hat, CISA, Dell, Oracle, Flexera). Explicitly references SBOM as the primary mechanism for delivering lifecycle/EoL data. Defines how EoL fields integrate into SBOM formats (CycloneDX, SPDX) and VEX documents. BOM refs: SBOM: p. 4
Defines end of security support lifecycle milestones, security patch availability periods
Legal analysis of RED Art. 3(3)(i) lockdown requirements and their impact on Free and Open Source Software (FOSS). Examines whether RED software compliance verification obligations conflict with FOSS license terms (GPL 3.0, LGPL). References SPDX identifiers for license categorization. Discusses the shift of legal responsibility from users to manufacturers for software loaded on radio equipment. Relevant context for understanding FOSS/OSS software supply chain implications under RED, though pre dates SBOM as a regulatory concept.
Legal analysis of RED impact on FOSS, no vulnerability management content
ETSI EN 303 645 V2.1.1 (30 Jun 2020) is the foundational European Consumer IoT baseline. Provision 5.2-3 explicitly requires building an SBOM.
ETSI EN 303 645 v2.1.1 mandates coordinated vulnerability disclosure, secure defaults, and minimized attack surfaces. 13 top-level provisions.
CISA Framing Software Component Transparency: Establishing a Common SBOM (3rd Edition, Sep 2024). Defines baseline, recommended, and aspirational SBOM attributes.
CISA Framing SBOM 3rd Edition dedicates Section 3.6.1 to Vulnerability Management and VEX integration for communicating vulnerability exploitability status.
PCAST Report on Cyber-Physical Resilience (Feb 2024). Advisory report recommending strengthening open-source and software supply-chain security including SBOM.
PCAST recommends strengthening critical infrastructure cyber resilience including vulnerability disclosure programs and cyber-physical research and development.
Draft DoD manual for cyber DT&E process. Focused on test and evaluation procedures for defense acquisition programs. No SBOM mention in the current draft text. SBOM requirements for defense software come from other DoD directives.
Vulnerability management in defense acquisition, vulnerability database usage, penetration testing requirements for defense systems
CISA 2025 Minimum Elements for SBOM (Draft, Aug 2025). Updated NTIA minimum elements reflecting the current state of software transparency. Public-comment draft; comment period closed 3 Oct 2025. 92 public comments were received on the regulations.gov docket CISA-2025-0007.
CISA 2025 Min Elements defines the minimum SBOM data supporting vulnerability management and database querying for federal and commercial use.
NSA CSI Recommendations for SBOM Management v1.1 (Jan 2024). Guidance for National Security Systems on SBOM ingest, storage, analysis, and monitoring.
NSA CSI ties SBOM management to vulnerability analysis and continuous monitoring against vulnerability databases.
ETSI EN 303 645 v3.1.3 (Sep 2024) is the Consumer IoT baseline standard referenced by the UK PSTI Act. Provision 5.2-3 requires building an SBOM of third-party components.
ETSI EN 303 645 v3.1.3 mandates coordinated vulnerability disclosure policy, secure defaults, and minimized attack surfaces.
NCSC Vulnerability Disclosure Toolkit v2 is a VM-focused toolkit. No explicit SBOM content; supports CVD processes that feed SBOM-based vulnerability remediation.
NCSC toolkit establishes a coordinated vulnerability disclosure process for UK organizations, aligned with ISO/IEC 29147 and RFC 9116.
NCSC guidance entirely focused on SBOM. Covers generation, signing, dynamic updates, developer considerations, end user utility, and limitations. Notes SBOMs should be cryptographically signed and paired with vulnerability scanners. References US EO 14028 and EU CRA.
SBOM paired with vulnerability scanners, regular vulnerability checking of components, supply chain vulnerability monitoring
UK DSIT Government Response to the Call for Views on the Code of Practice for Software Vendors (CP 1281, March 2025, 60 pages). The document does not explicitly mention SBOM, Software Bill of Materials, CycloneDX, SPDX, or VEX. Classification is Implicit because the code addresses multiple SBOM-adjacent concepts.
Technical controls and full implementation guidance are being developed by DSIT with the NCSC as accompanying material and may contain explicit SBOM references when published.
Principle 3 (Secure deployment and maintenance) explicitly covers vulnerability management. Provisions for Senior Responsible Officers:
Voluntary code with no specific disclosure hours mandated. 71% of respondents supported adding an assurance or certification scheme.
UK Software Security Code of Practice (DSIT, May 2025; updated January 2026, co-sealed by CCCS). 14 voluntary principles. SBOM practice is implicit in the secure SDLC and third-party management requirements.
UK Software Security Code of Practice requires timely security updates, a public vulnerability disclosure policy, and awareness of actively exploited vulnerabilities.
CERT-In Technical Guidelines on SBOM, QBOM & CBOM, AIBOM and HBOM v2.0 (Jul 2025) is India's primary technical reference for Bill-of-Materials practices across software, crypto/quantum, AI, and hardware.
CERT-In guidelines couple BOM practices with vulnerability tracking. Section 6 details how to use SBOM data for vulnerability identification and remediation.
Section 3.7 directly addresses SBOM requirements. Mandates SBOM for SEBI Regulated Entities as part of software supply chain security and asset inventory obligations. BOM refs: SBOM: pp. 1, 3, 13
Clarifies patch management obligations, penetration testing requirements for SEBI Regulated Entities
ETSI TS 104 107 is the O-RAN security protocols specification covering cryptography and authentication protocols. No explicit SBOM content.
ETSI TS 104 107 defines authentication, TLS/mTLS, IPsec, cryptographic, and key management protocols that underpin vulnerability-free O-RAN communications.
ETSI TR 104 106 on O-RAN threat modeling includes supply-chain and open-source component risk considerations.
ETSI TR 104 106 documents threat models and risk assessment methodology for O-RAN deployments with vulnerability analysis.
ETSI TS 104 105 defines security test specifications for O-RAN components including SBOM vulnerability cross-check and open-source analysis.
ETSI TS 104 105 specifies normative test cases validating security controls of O-RAN components and interfaces.
ETSI TS 104 104 is the core O-RAN security requirements specification. Clause 10 mandates SBOM for every software delivery.
ETSI TS 104 104 defines O-RAN vulnerability management, secure update delivery, authentication, and security logging requirements.
ETSI TR 104 034 V1.1.1 is an SBOM compendium covering practices, formats, and use cases across industries.
ETSI TR 104 034 maps SBOM consumption to vulnerability management and VEX use cases.
Parliamentary briefing on Regulation (EU) 2024/2847. Explicitly mentions SBOM as one of the CRA's key transparency tools alongside vulnerability disclosure requirements. BOM refs: SBOM: p. 12
Parliamentary summary of CRA vulnerability handling, actively exploited vulnerability notification, security update obligations, penetration testing
Annual EU threat intelligence report. References software supply chain attacks and the need for software component visibility. Does not explicitly name SBOM but the attack patterns described are the core SBOM use case.
Documents vulnerability exploitation trends, zero day attacks, vulnerability disclosure practices, patch management recommendations, vulnerability scanning
Entirely focused on SBOM. Covers SBOM formats (CycloneDX, SPDX), tooling landscape, component inventory, software transparency, and implementation guidance aligned with EU CRA. BOM refs: SBOM: pp. 1-83 · MLBOM: p. 16
Vulnerability monitoring, vulnerability management via SBOM, vulnerability database integration, vulnerability scanning, patch management, zero day handling
Commission briefing deck on CRA implementation. Explicitly mentions SBOM as a key compliance artifact required under CRA Annex I. No specific date on document. BOM refs: SBOM: p. 7
Briefing presentation, no vulnerability management detail
European Commission implementation FAQs for Regulation (EU) 2024/2847. Explicitly addresses SBOM obligations, scope, and compliance timelines under the CRA. BOM refs: SBOM: p. 47
Vulnerability handling obligations, coordinated disclosure, actively exploited vulnerability notification, zero day scenarios, security update delivery, penetration testing
BSI TR-03183 Part 3 v1.0.0 focuses on vulnerability reports and notifications. SBOM linkage is via companion Part 2; component identification feeds into vulnerability advisories.
BSI TR-03183 Part 3 defines CSAF-aligned vulnerability report content, format, and timelines. Aligned with EU CRA Article 14 (24h/72h/14d).
BSI TR-03183 Part 2 v2.1.0 is Germany's normative SBOM technical guideline aligned with EU CRA Annex I. Defines SBOM content, required fields, accepted formats, levels, and delivery.
BSI TR-03183 Part 2 is an SBOM standard. Vulnerability handling process is defined in companion Part 3 (Vulnerability Reports and Notifications).
BSI TR-03183 Part 1 v0.10.0 (Sep 2025) defines general cyber-resilience requirements for products with digital elements. SBOM obligation is detailed in companion Part 2.
BSI TR-03183 Part 1 references the vulnerability handling process in companion Part 3. Security-update delivery and incident response are general Chapter 6-7 themes.
Bill C-8 (Canada Critical Cyber Systems Protection Act, introduced 18 Jun 2025). Successor to Bill C-26 (died on prorogation Jan 2025); currently in SECU committee study. Contains supply-chain and third-party risk provisions; SBOM implicit in software component visibility obligations.
Bill C-8 mandates 72-hour incident reporting to CSE for designated critical cyber systems operators and periodic program review. Successor to Bill C-26 (died on prorogation Jan 2025); currently in SECU committee study.
Korea MSIT/KISA Comprehensive Plan (22 Oct 2025) mandates SBOM submission for regulated-sector IT systems, with full institutionalization by 2027.
Korea MSIT Plan enables real-time vulnerability inspection across software components in public, financial, telecom, and platform sectors.
METI/IPA JC-STAR IoT Product Security Labeling Scheme (launched 25 Mar 2025). Tiered labeling with SBOM required at the highest assurance level.
JC-STAR requires vulnerability disclosure policy and security-update commitment from manufacturers across all assurance levels.
METI Guide on SBOM for Software Management v2.0 (Aug 2024) is Japan's primary SBOM implementation guide for suppliers and procurers. v2.0 expands to procurement side.
METI guide Section 5 details a vulnerability management workflow using SBOM data, covering monitoring, NVD querying, CVD, and zero-day handling.
We shortened our vulnerability review timeframe from a day to under an hour. It is our go-to tool and we now know where to focus our limited security resources next.

SBOM Studio saves us approximately 500 hours per project on vulnerability analysis and prioritization for open-source projects.
