SlideShare a Scribd company logo
6
Most read
7
Most read
8
Most read
How to Identify
and Tackle SBOM
Sprawl
Webinar | April 22, 2025
Housekeeping 2
01
02
03
All participant lines are muted
Questions will be accepted throughout, enter questions via Zoom
You will receive a follow-up email with a link to the recording
Introductions
Russ Eling
Founder of OSS Consultants
Alex Rybak
Director, Product Management at Anchore
Today’s Agenda 4
01
02
03
Introduction to SBOMs
Understanding SBOM sprawl
Strategies and best practices to reduce and manage SBOM sprawl
04 How we can help
Introduction to SBOMs 5
An SBOM is a nested inventory, a list of ingredients that make up SW components
● Not a new concept; has been around in
hardware for decades
● Provides transparency into software ingredients
to assist with assessment and remediation
● Rapid increase in adoption the past few years
● Lots of great resources are available at
https://www.cisa.gov/sbom
Regulations Driving SBOMs 6
● Cyber EO 14028 & OMB Memo M-22-18
○ Agencies must collect SBOMs from software
vendors, especially for critical software
● SSDF: NIST SP 800-218
○ Suggests documenting components (including
third-party/open-source); essentially an SBOM
● Many Regulated Industries
○ Automotive (NHTSA)
○ Medical Devices (FDA Cyber Guidelines)
○ Energy (NERC)
○ Public Companies (SEC Cyber Rules: 8-K & 10-K)
● Standards Bodies
○ ISO 27001
United States European Union (EU)
● EU Cyber Resiliency Act
○ SBOMs required for software with digital elements
● NIS2 (Network and Information Security
Directive 2)
○ Expands cybersecurity mandates for critical sectors:
energy, healthcare, transport, finance, digital
infrastructure, public services, etc.
● DORA (Digital Operational Resilience Act)
○ Aims to strengthen resilience in financial sector
● PCI DSS4 (Payment Card Industry Data
Security Standard)
○ Requirement 6: Develop and Maintain Secure
Systems and Software
○ Requirement 10.8.1: Responding to Indicators of
Compromise (IoCs)
Understanding SBOM Sprawl 7
● Multiple formats: CycloneDX, SPDX,
proprietary
● Different tools generating SBOMs at
various stages of development
● Inconsistent ownership across teams
● Lack of integration with security,
compliance, and DevSecOps pipelines
● Data overload and inefficiencies: too many
SBOMs with redundant or conflicting
information; overlapping analysis and
remediation efforts
● Compliance challenges: difficulty meeting
regulatory requirements (e.g., EO 14028, NIST
guidelines)
● Security gaps: inability to effectively monitor
vulnerabilities and dependencies
The proliferation of SBOMs across an organization without a centralized strategy
Causes of Sprawl Impact of SBOM Sprawl
Strategies to Manage SBOM Sprawl 8
● Use industry-recognized formats like
CycloneDX or SPDX
● Consider compatibility with your existing
security and compliance tools
● Centralize SBOM storage in an SBOM
management system
● Automate SBOM generation, validation,
updates, and alerts
● Integrate SBOMs into your development
pipelines and security tools
● Continuously monitor SBOMs for new
vulnerabilities
Standardize
● Define clear roles and responsibilities for
SBOM management
● Educate your teams
● Ensure compliance with regulations and
internal security frameworks
Governance and Ownership
Integrate and Automate
How Anchore Can Help 9
● Construct SBOMs from repo, container, and runtime scans
● Import SBOMs from other tools or upstream vendors
● Report security issues: vulnerabilities, secrets, malware
● Enforce compliance via policy packs
● Integrate with Engineering toolchain
● Visualize changes over time
● Assess impact across organization
● Founded in 2016 in California by ex-Ansible / Red Hat / Eucalyptus Founders
● Creators of Syft and Grype with 30 million downloads
● Anchore Enterprise deployed in the DOD and the largest technology vendors in the world since 2018
How OSS Consultants Can Help 10
● Full service consultancy for managing use of
open source software
● Build complete open source management
strategies for organizations of all sizes
● Scanning and audit of your codebases to build
your SBOMs, and comply with licensing obligations
● Help organizations understand and manage the
risks associated with open-source software use
● Provide efficient, comprehensive, and robust
implementation of open source programs,
and policies
Your Trusted Partner in Open Source Management
Key Takeaways 11
01
02
03
Standardize on tooling and formats
Establish governance and ownership
Implement your process and controls
04 Integrate and automate
© 2025
sales@anchore.com
info@ossconsultants.com
anchore.com
ossconsultants.com
Any Questions?
Next Steps
Learn more about Anchore Enterprise: https://anchore.com/platform
Learn more about OSS Consultants: https://ossconsultants.com
OSPO Case Study with OSS Consultants & Blackberry:
https://ossconsultants.com/blackberry-openchain-case-study/
Visit our GitHub and Discourse:
github.com/anchore and anchore.com/discourse
eBook: SBOM 101:
https://get.anchore.com/sbom101-guide-for-devsecops-community/
© 2025
sales@anchore.com
info@ossconsultants.com
anchore.com
ossconsultants.com
Thank you!

More Related Content

PDF
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
PDF
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
PDF
UniqueSoft Overview
bmskelly
 
PPTX
Why is Open Source Important to Samsung and What Are We Doing About It?
Samsung Open Source Group
 
PPTX
Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Pvt. Ltd
 
PPT
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Zero Wait-State
 
PPTX
Software Composition Analysis: The New Armor for Your Cybersecurity
Aggregage
 
PPTX
C.3.1.E4 ICT404 Lecture Slides 5_A_cybersec.pptx
vamsikrishnasomayaju
 
Establish Visibility and Manage Risk in the Supply Chain with Anchore SBOM
Anchore
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
Paris Open Source Summit
 
UniqueSoft Overview
bmskelly
 
Why is Open Source Important to Samsung and What Are We Doing About It?
Samsung Open Source Group
 
Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Pvt. Ltd
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Zero Wait-State
 
Software Composition Analysis: The New Armor for Your Cybersecurity
Aggregage
 
C.3.1.E4 ICT404 Lecture Slides 5_A_cybersec.pptx
vamsikrishnasomayaju
 

Similar to Webinar: How to Identify and Tackle SBOM Sprawl (20)

PDF
Microsoft Power Platform Governance with Runpipe
Runpipe
 
PPTX
Owasp Summit - Wednesday evening briefing master
Dinis Cruz
 
PPTX
2024 Most Influenced Software Development Technologies_ A Detailed Recap.pptx
infosprintseo
 
PPTX
How to add security in dataops and devops
Ulf Mattsson
 
PDF
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
 
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
PDF
Top 5 best practice for delivering secure in-vehicle software
Rogue Wave Software
 
PDF
Qa Financials - 10 Smart Controls for Software Development
Hernan Huwyler, MBA CPA
 
PDF
The Risks of Delaying KSA PDPL Compliance - Why Early Action Matters
Pyxos
 
PDF
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
PDF
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
hani727151
 
PPTX
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
PDF
Unlocking Engineering Observability with advanced IT analytics
source{d}
 
PPTX
OpenChain Germany Work Group Meeting 2022-11-16
Shane Coughlan
 
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
PPTX
OSS has taken over the enterprise: The top five OSS trends of 2015
Rogue Wave Software
 
PPTX
From Labs to Production: The Growing Ecosystem of LF Decentralized Trust
LFDT Tokyo Meetup
 
PPTX
Top learnings from evaluating and implementing a DLP Solution
Priyanka Aash
 
PPTX
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Microsoft Power Platform Governance with Runpipe
Runpipe
 
Owasp Summit - Wednesday evening briefing master
Dinis Cruz
 
2024 Most Influenced Software Development Technologies_ A Detailed Recap.pptx
infosprintseo
 
How to add security in dataops and devops
Ulf Mattsson
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
 
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Shane Coughlan
 
Top 5 best practice for delivering secure in-vehicle software
Rogue Wave Software
 
Qa Financials - 10 Smart Controls for Software Development
Hernan Huwyler, MBA CPA
 
The Risks of Delaying KSA PDPL Compliance - Why Early Action Matters
Pyxos
 
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
A_Statistical_Study_and_Analysis_to_Identify_the_Importance_of_Open-source_So...
hani727151
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Unlocking Engineering Observability with advanced IT analytics
source{d}
 
OpenChain Germany Work Group Meeting 2022-11-16
Shane Coughlan
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
OSS has taken over the enterprise: The top five OSS trends of 2015
Rogue Wave Software
 
From Labs to Production: The Growing Ecosystem of LF Decentralized Trust
LFDT Tokyo Meetup
 
Top learnings from evaluating and implementing a DLP Solution
Priyanka Aash
 
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
 
Ad

More from Anchore (20)

PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Shift Right Security for EKS Webinar Slides
Anchore
 
PDF
Rapid Incident Response to Zero Day Vulnerabilities
Anchore
 
PDF
STIG in Action: Continuous Compliance with MITRE & Anchore
Anchore
 
PDF
Increase Supply Chain Transparency & Security with Harbor & Anchore
Anchore
 
PDF
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
Anchore
 
PDF
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
Anchore
 
PDF
Understanding SBOMs: An Introduction to Modern Development
Anchore
 
PDF
2024 Trends in Software Supply Chain Security
Anchore
 
PDF
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
Anchore
 
PDF
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Anchore
 
PDF
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
Anchore
 
PDF
Release Webinar: Introducing the Anchore Data Service
Anchore
 
PDF
How SBOMs Protect Google's Massive Software Supply Chain
Anchore
 
PDF
Automated Policy Enforcement for CMMC with Anchore Enterprise
Anchore
 
PDF
Adopting the DoD Software Factory Model: Insights & How Tos
Anchore
 
PDF
Easy Compliance is Continuous Compliance
Anchore
 
PDF
How to Secure Your Kubernetes Software Supply Chain at Scale
Anchore
 
PDF
Adapting to the new normal at NVD with Anchore Vulnerability Feed
Anchore
 
PDF
Software Security in the Real World w/Kelsey Hightower
Anchore
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Shift Right Security for EKS Webinar Slides
Anchore
 
Rapid Incident Response to Zero Day Vulnerabilities
Anchore
 
STIG in Action: Continuous Compliance with MITRE & Anchore
Anchore
 
Increase Supply Chain Transparency & Security with Harbor & Anchore
Anchore
 
Understanding SBOMs: How to Automate, Generate & Manager SBOMs
Anchore
 
Understanding SBOMs - Deep Dive with Kate Stewart.pdf
Anchore
 
Understanding SBOMs: An Introduction to Modern Development
Anchore
 
2024 Trends in Software Supply Chain Security
Anchore
 
STIG 101 with MITRE & Anchore: Insights for Compliance & Cyber Readiness
Anchore
 
Expert Series: Solving Real-World Challenges in FedRAMP Compliance
Anchore
 
Accelerate FedRAMP Compliance on Amazon EKS with Anchore
Anchore
 
Release Webinar: Introducing the Anchore Data Service
Anchore
 
How SBOMs Protect Google's Massive Software Supply Chain
Anchore
 
Automated Policy Enforcement for CMMC with Anchore Enterprise
Anchore
 
Adopting the DoD Software Factory Model: Insights & How Tos
Anchore
 
Easy Compliance is Continuous Compliance
Anchore
 
How to Secure Your Kubernetes Software Supply Chain at Scale
Anchore
 
Adapting to the new normal at NVD with Anchore Vulnerability Feed
Anchore
 
Software Security in the Real World w/Kelsey Hightower
Anchore
 
Ad

Recently uploaded (20)

PDF
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
ESUG
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PPTX
oapresentation.pptx
mehatdhavalrajubhai
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PPTX
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
PDF
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
PDF
Bandai Playdia The Book - David Glotz
BluePanther6
 
PDF
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
ESUG
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
Version 1 Analytics
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
oapresentation.pptx
mehatdhavalrajubhai
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
An Experience-Based Look at AI Lead Generation Pricing, Features & B2B Results
Thomas albart
 
Bandai Playdia The Book - David Glotz
BluePanther6
 
Generating Union types w/ Static Analysis
K. Matthew Dupree
 

Webinar: How to Identify and Tackle SBOM Sprawl

  • 1. How to Identify and Tackle SBOM Sprawl Webinar | April 22, 2025
  • 2. Housekeeping 2 01 02 03 All participant lines are muted Questions will be accepted throughout, enter questions via Zoom You will receive a follow-up email with a link to the recording
  • 3. Introductions Russ Eling Founder of OSS Consultants Alex Rybak Director, Product Management at Anchore
  • 4. Today’s Agenda 4 01 02 03 Introduction to SBOMs Understanding SBOM sprawl Strategies and best practices to reduce and manage SBOM sprawl 04 How we can help
  • 5. Introduction to SBOMs 5 An SBOM is a nested inventory, a list of ingredients that make up SW components ● Not a new concept; has been around in hardware for decades ● Provides transparency into software ingredients to assist with assessment and remediation ● Rapid increase in adoption the past few years ● Lots of great resources are available at https://www.cisa.gov/sbom
  • 6. Regulations Driving SBOMs 6 ● Cyber EO 14028 & OMB Memo M-22-18 ○ Agencies must collect SBOMs from software vendors, especially for critical software ● SSDF: NIST SP 800-218 ○ Suggests documenting components (including third-party/open-source); essentially an SBOM ● Many Regulated Industries ○ Automotive (NHTSA) ○ Medical Devices (FDA Cyber Guidelines) ○ Energy (NERC) ○ Public Companies (SEC Cyber Rules: 8-K & 10-K) ● Standards Bodies ○ ISO 27001 United States European Union (EU) ● EU Cyber Resiliency Act ○ SBOMs required for software with digital elements ● NIS2 (Network and Information Security Directive 2) ○ Expands cybersecurity mandates for critical sectors: energy, healthcare, transport, finance, digital infrastructure, public services, etc. ● DORA (Digital Operational Resilience Act) ○ Aims to strengthen resilience in financial sector ● PCI DSS4 (Payment Card Industry Data Security Standard) ○ Requirement 6: Develop and Maintain Secure Systems and Software ○ Requirement 10.8.1: Responding to Indicators of Compromise (IoCs)
  • 7. Understanding SBOM Sprawl 7 ● Multiple formats: CycloneDX, SPDX, proprietary ● Different tools generating SBOMs at various stages of development ● Inconsistent ownership across teams ● Lack of integration with security, compliance, and DevSecOps pipelines ● Data overload and inefficiencies: too many SBOMs with redundant or conflicting information; overlapping analysis and remediation efforts ● Compliance challenges: difficulty meeting regulatory requirements (e.g., EO 14028, NIST guidelines) ● Security gaps: inability to effectively monitor vulnerabilities and dependencies The proliferation of SBOMs across an organization without a centralized strategy Causes of Sprawl Impact of SBOM Sprawl
  • 8. Strategies to Manage SBOM Sprawl 8 ● Use industry-recognized formats like CycloneDX or SPDX ● Consider compatibility with your existing security and compliance tools ● Centralize SBOM storage in an SBOM management system ● Automate SBOM generation, validation, updates, and alerts ● Integrate SBOMs into your development pipelines and security tools ● Continuously monitor SBOMs for new vulnerabilities Standardize ● Define clear roles and responsibilities for SBOM management ● Educate your teams ● Ensure compliance with regulations and internal security frameworks Governance and Ownership Integrate and Automate
  • 9. How Anchore Can Help 9 ● Construct SBOMs from repo, container, and runtime scans ● Import SBOMs from other tools or upstream vendors ● Report security issues: vulnerabilities, secrets, malware ● Enforce compliance via policy packs ● Integrate with Engineering toolchain ● Visualize changes over time ● Assess impact across organization ● Founded in 2016 in California by ex-Ansible / Red Hat / Eucalyptus Founders ● Creators of Syft and Grype with 30 million downloads ● Anchore Enterprise deployed in the DOD and the largest technology vendors in the world since 2018
  • 10. How OSS Consultants Can Help 10 ● Full service consultancy for managing use of open source software ● Build complete open source management strategies for organizations of all sizes ● Scanning and audit of your codebases to build your SBOMs, and comply with licensing obligations ● Help organizations understand and manage the risks associated with open-source software use ● Provide efficient, comprehensive, and robust implementation of open source programs, and policies Your Trusted Partner in Open Source Management
  • 11. Key Takeaways 11 01 02 03 Standardize on tooling and formats Establish governance and ownership Implement your process and controls 04 Integrate and automate
  • 13. Next Steps Learn more about Anchore Enterprise: https://anchore.com/platform Learn more about OSS Consultants: https://ossconsultants.com OSPO Case Study with OSS Consultants & Blackberry: https://ossconsultants.com/blackberry-openchain-case-study/ Visit our GitHub and Discourse: github.com/anchore and anchore.com/discourse eBook: SBOM 101: https://get.anchore.com/sbom101-guide-for-devsecops-community/