Log In

SBOM Standards and Formats (e.g., CycloneDX)

The Software Bill of Materials (SBOM) is a critical component in modern software development and cybersecurity. It provides a detailed inventory of the components and dependencies that make up a software application. In this article, we will explore SBOM standards and formats, with a focus on the CycloneDX format. SBOMs play a pivotal role in enhancing software supply chain security, vulnerability management, and regulatory compliance.

What is a Software Bill of Materials (SBOM)?

A Software Bill of Materials (SBOM) is a structured list of all the components and dependencies that make up a software application. These components can include libraries, frameworks, modules, and even third-party software used within the application. SBOMs provide transparency and visibility into the software supply chain, enabling organizations to better understand the composition of their software.

Why is a SBOM Important?

SBOMs are crucial for several reasons:

  1. Security: SBOMs aid in identifying vulnerabilities within software components, allowing organizations to prioritize and remediate them promptly.
  2. Regulatory Compliance: Many regulations and standards, such as the Cybersecurity Maturity Model Certification (CMMC) and Executive Order 14028 on Improving the Nation’s Cybersecurity, require organizations to produce SBOMs for their software.
  3. Risk Mitigation: SBOMs help organizations assess and mitigate the risks associated with third-party components and dependencies.

Software Bill of Materials (SBOM) Standards and Formats

Several SBOM standards and formats have emerged to standardize the way SBOMs are created, exchanged, and used. One of the notable formats is CycloneDX.


CycloneDX is an open standard for representing SBOMs in a consistent and machine-readable format. It is designed to be easy to create, parse, and use across various stages of the software development and supply chain.

Key Features of CycloneDX

  • Lightweight: CycloneDX uses a concise and easy-to-read JSON or XML format, making it accessible for both humans and machines.
  • Component Identifiers: Each component in a CycloneDX SBOM is uniquely identified, enabling precise tracking of dependencies.
  • License Information: CycloneDX includes license information for each component, which is crucial for compliance and risk assessment.
  • Versioning: It captures version information for each component, aiding in vulnerability management and software updates.
  • Extensibility: CycloneDX allows for the inclusion of additional metadata or custom fields, making it adaptable to various use cases.

The Anatomy of a CycloneDX SBOM

The CycloneDX Software Bill of Materials (SBOM) is an open standard designed for the software supply chain traceability. SBOMs provide a list of binary artifacts, their dependencies, and metadata used to piece them together. The following sections extensively describe each important section in the CycloneDX format.


The BOM is the root element of the CycloneDX document and signifies a software bill of materials. An example is:

<bom xmlns="http://cyclonedx.org/schema/bom/1.2" version="1" serialNumber="urn:uuid:550e8400-e29b-41d4-a716-446655440000">
 <!-- BOM components would go here -->


Components describe analytical data about the software. Each component used by the software project is added to the BOM. For instance:

<component type="library">

<component type="framework">


The group section typically represents the organization that produced the component. An example is:



Licenses are used to specify which licenses apply to a given component or components. For example:



Used to exactly specify the location of a software package. An example is:



Properties are user-defined and allow you to provide specific metadata about a component. An example is:

  <property name='source'>Internal</property>
  <property name='classification'>Proprietary</property>

External References

These references allow users to link to additional data about the component. For example:

  <reference type="website">
  <reference type="advisories">


Hashes provide a way to ensure the integrity and authenticity of a component by providing SHA-1, SHA-256, or SHA-512 hashes of the component file:

  <hash alg="SHA-256">6a3946e2e131dfd3b70ef3135ccf75c68f4996e6b417a20a8b9a2a2a2a511a6e</hash>

In conclusion, the CycloneDX SBOM provides an open standard that leverages XML or JSON to produce a comprehensive, detailed document for tracking and managing software components, their origin, and any relevant updates or vulnerabilities.

Example of a JSON CycloneDX SBOM

  "bomFormat": 2.3,
  "specVersion": 1.2,
  "serialNumber": "urn:uuid:550e8400-e29b-41d4-a716-446655440000",
  "metadata": {
    "timestamp": "2023-10-06T12:00:00Z",
    "tools": [
        "vendor": "Example Corp",
        "name": "SBOM Generator",
        "version": "1.0"
  "components": [
      "type": "library",
      "name": "example-library",
      "version": "1.2.3",
      "purl": "pkg:example/example-library@1.2.3",
      "licenses": ["MIT"]
      "type": "framework",
      "name": "example-framework",
      "version": "2.0.1",
      "purl": "pkg:example/example-framework@2.0.1",
      "licenses": ["Apache-2.0"]

Using CycloneDX in Software Development

CycloneDX can be integrated into various stages of the software development lifecycle:

  • Build Process: Developers can generate CycloneDX SBOMs during the build process to automatically document dependencies.
  • Continuous Integration/Continuous Deployment (CI/CD): SBOM generation can be part of the CI/CD pipeline, ensuring that every release includes an up-to-date SBOM.
  • Vulnerability Scanning: Security tools can use CycloneDX SBOMs to identify and report vulnerabilities in software components.
  • Supply Chain Security: Organizations can exchange CycloneDX SBOMs with suppliers and partners to enhance supply chain security.

Other SBOM Formats

While CycloneDX is a prominent SBOM format, there are other standards and formats in use, depending on the specific requirements of organizations and industries. Some of these include:

CycloneDX vs. SPDX

CycloneDX and SPDX (Software Package Data Exchange) are two popular software bill of materials (SBOM) formats used to comprehensively list components in a piece of software. Both SBOM formats commit to enhancing transparency in software supply chains, identifying vulnerabilities, licensing issues, and maintaining up-to-date inventories.

CycloneDX and SPDX, while serving similar purpose, differ significantly in design and intended uses. CycloneDX was developed particularly for use in application security contexts and DevSecOps environments. It supports granularity at the component level and is lightweight and easier to generate, simplifying the process for developers. Its XML and JSON format coupled with its simplicity makes its information quickly digestible while providing a practical solution for software component tracking.

On the other hand, SPDX caters to much broader and diverse use-cases, beyond just security. It is a Linux Foundation project often used for open source license compliance. SPDX is considerably more complex, offering in-depth details including licensing, copyrights, and security references. The complexity, extent, and detail of SPDX make it more suitable for use in large, complex enterprise systems dealing with comprehensive license compliance and numerous software components and vendors.


In an era of increasing cybersecurity threats and regulatory demands, Software Bill of Materials (SBOMs) have become essential for software development and supply chain management. CycloneDX, as one of the key SBOM formats, offers a lightweight and standardized way to document software components and dependencies. Its adoption can greatly enhance software security, compliance, and risk management.

While CycloneDX is a popular choice, organizations should carefully evaluate their specific needs and industry requirements when selecting an SBOM format. Ultimately, the adoption of SBOMs is a crucial step towards a more secure and transparent software ecosystem.

By incorporating SBOMs like CycloneDX into their practices, organizations can make informed decisions about the software they use and develop, thereby reducing vulnerabilities and improving overall cybersecurity posture.