- TODO: Add Description
Motivation
- The initial motivation for the formation of the OSSF SBOM Everywhere SIG is born from OpenSSF's The Open Source Software Security Mobilization Plan. SBOM standardization and consensus from within the open source community is integral to adoption of universal constructs that reveal themselves via the exploration of use cases beyond a compliance check box. [Executive Order ]
Objective
Draft
- Securing OSS Production: focus on preventing security defects and vulnerabilities in code and open source packages in the first place
- Improving Vulnerability Discovery & Remediation: improving the process for finding defects and fixing them
- Shorten Ecosystem Patching Response Time: Shorten the response time for distributing and implementing fixes.
- The requirements needed to build use cases using SBOMs are clearly understood, documented and implemented in current SBOM specifications
- There are “friction free” open source tools that generate SBOMs that meet these requirements
- There is readily accessible education, awareness and implementation guidance and 3rd party support
Scope
Draft The mobilization plan defines scope as By focusing on tools and advocacy, we can remove the barriers to generation, consumption, and overall adoption of SBOMs everywhere, we can improve the security posture of the entire open source ecosystem: producers, consumers, and maintainers.
Formatting Specifications
For the purposes of establishing ubiquity to ensure sustainability for SBOM related tooling, and future solutions for consumption, “supported” formats must be defined. At this time there are two supported formats that will be in scope for the purposes of this group: CycloneDX and SPDX.
Utilization of these specifications would likely be discretionary and interchangeable depending on the use case and SBOM type and the requirements of individual organizations and internal tooling.
This group's interpretation is
- Use cases
- Defining types of SBOMs
- Source
- Binary analysis
- Build
- Deploy Runtime
- Generation
- Formats - clearly define expectations
- Consumption
- How do we track and encourage the consumption of the artifacts
- something about tools
- Adoption (how do we encourage others to create and use SBOMs)
- Something about producers, consumers, and maintainers
- Where does the burden lie on accountability and enforcement?
- something about tools
- Tools are everywhere, what do we do with this?
- something about advocacy
- Attestation?
- Not part of tooling, this needs to be a policy decision in these conversations, don't worry about the technical details (yet)
- Where does this fit in? Producers, consumers, ???
- https://github.com/in-toto/attestation
- Compliance (regulated industry)
The Federal Government exists at every point of the Software Delivery Lifecycle, hence their minimum requirements are good guides to establish a baseline scope.
- Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations NIST SP 800-161 Rev. 1
- Executive Order 14028
- Minimum Standards for Federal Government End Users
Prior Work
- NTIA SBOM Resources
- Software Bill of Materials Elements and Considerations
- Plan to Congress on Declassification and Clearances related to The Communications Supply Chain Risk Information Partnership
NTIA's legwork has been a guiding source having done the most comprehensive research to date.
Get Involved
- Official communications occur on the openssf-sig-sbom mailing list
- Slack Channel
Quick Start
- Areas that need contributions
- Build information if applicable
- Where to file issues
- Etc.
Meeting times
We are currently holding our meetings during the Security Tooling WG meeting. Look for the "Security Tooling Working Group" entry in the calendar.
- Every other Tuesday @ 11:05am EST. The invite is available on the OpenSSF Community Calendar.
- Meeting Minutes
Governance
The CHARTER.md outlines the scope and governance of our group activities.
- TODO: Fill out charter
Members