<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SBOMs on</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/</link><description>Recent content in SBOMs on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Thu, 26 Jan 2023 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/index.xml" rel="self" type="application/rss+xml"/><item><title>What is an SBOM (software bill of materials)?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/what-is-an-sbom/</link><pubDate>Thu, 04 Aug 2022 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/what-is-an-sbom/</guid><description>Modern software applications contain hundreds to thousands of open source and third-party components, creating significant security challenges that SBOMs help address - which is why Chainguard includes comprehensive SBOMs with every container image. Without structured visibility into these components, organizations struggle to identify and respond to vulnerabilities, even when patches are available. This lack of transparency leaves systems vulnerable to exploitation, making SBOMs essential for maintaining secure software supply chains.</description></item><item><title>Getting Started with OpenVEX and vexctl</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/getting-started-openvex-vexctl/</link><pubDate>Mon, 30 Jan 2023 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/getting-started-openvex-vexctl/</guid><description>The vexctl CLI is a tool to make VEX work. As part of the open source OpenVex project, vexctl enables you to create, apply, and attest VEX (Vulnerability Exploitability eXchange) data in order to filter out false positive security alerts.
The vexctl tool was built to help with the creation and management of VEX documents, communicate transparently to users as time progresses, and enable the &amp;ldquo;turning off&amp;rdquo; of security scanner alerts of vulnerabilities known not to affect a given product.</description></item><item><title>What Makes a Good SBOM?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/what-makes-a-good-sbom/</link><pubDate>Thu, 04 Aug 2022 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/what-makes-a-good-sbom/</guid><description>A software bill of materials, or an SBOM (pronounced s-bomb), is a formal record of the components contained in a piece of software. It is analogous to an ingredients list for a recipe. And it has become recognized as one of the key building blocks of software supply chain security. Proponents rightfully point out that organizations can&amp;rsquo;t secure their software if they don&amp;rsquo;t know what&amp;rsquo;s inside their software.
As awareness and adoption of SBOM has grown, there has been a gradual acknowledgement that not all SBOMs are created equal, some are more or less useful, depending on the goals of the SBOM user and the contents of the SBOM.</description></item><item><title>What is OpenVex?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/what-is-openvex/</link><pubDate>Tue, 31 Jan 2023 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/what-is-openvex/</guid><description>OpenVEX is an open source specification, library, and suite of tools designed to enable software users to eliminate vulnerability noise and focus their security efforts on vulnerabilities that pose an immediate risk. Released by Chainguard in January 2023, it’s the first set of open source tools to support the VEX specification championed by the United States National Telecommunications and Information Administration (NTIA) and the Cybersecurity and Infrastructure Security Agency (CISA).</description></item><item><title>The Differences between SBOMs and Attestations</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/sboms-and-attestations/</link><pubDate>Sun, 19 Mar 2023 15:56:52 -0700</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/open-source/sbom/sboms-and-attestations/</guid><description>One of the first steps to improving your software supply chain security is to establish a process for creating quality Software Bills of Materials (SBOMs). An SBOM is a formal record that contains the details and supply chain relationships (such as dependencies) of the components used in building software.
Cosign — a part of the Sigstore project — supports software artifact signing, verification, and storage in an OCI (Open Container Initiative) registry.</description></item></channel></rss>