SBOM Is Not the Savior – Addressing the Deeper Problems in Supply Chain Security
This article was originally published on Scott’s Substack on June 3, 2025.
I hear a lot these days about SBOMs and how they are going to be the key to supply chain security accountability, to even include a Presidentialย Executive Orderย mandating SBOMs in the procurement process for federal agencies. There are multiple areas of research going on in this area, such as thisย Academic SBOM Repository. But before we get too far down the road,ย letโs get one thing straight:ย SBOM isnโt going to save us. Itโs a transparency tool, not a solution. And treating it like a silver bullet for supply chain security is not just misguided: itโs dangerous.
In theory, SBOM (Software Bill of Materials) promises visibility into the components that make up your software, enabling faster response when vulnerabilities emerge. But in practice, itโs a Band-Aid on a broken process. Weโre trying to standardize metadata while ignoring the operational chaos that happens downstream.
To put it plainly: the problem isnโt that we donโt know whatโs in the software. Itโs that we have no scalable, reliable process to do anything meaningful with that information.
Story 1: Risk Posture Reporting Fantasyland
In 2024, I sat in a room with federal policymakers and software industry leaders. The proposal on the table? A framework where vendors report the risk posture of all shipped software on a recurring basis.
The response from industry?
โWe donโt even know what versions are running out there in the wild.โ
โInstead, can we sign attestation letters that say itโs secure?โ
Let that sink in. They couldnโt inventory deployed versions across environments but were perfectly fine checking a compliance box. This is what the SBOM ecosystem is becoming, compliance theater masking operational dysfunction. If CVE management is a mess, try tracking risk through firmware, dependency chains, and runtime variants. Itโs chaos on a good day.
Story 2: Vulnerability Management Shouldnโt Exist?
Rewind to 2022. At a founderโs dinner in San Francisco, a bright-eyed startup founder asked about my company. I told her we build vulnerability management software.
Her reaction? A grimace, followed by:
โI donโt think vulnerability management should even exist.โ
The idea? If we fix the software supply chain, bugs go away. In theory, maybe. In reality? Laughable. Software is human. Vulnerabilities are inevitable. And the notion that you can code your way out of the need for operational security is Silicon Valley magical thinking.
SBOM: Insight Without Action
The core issue isnโt with SBOM as a concept. Itโs with how weโve mythologized it. SBOM is a data format. Thatโs it. It doesnโt patch anything. It doesnโt assess risk. It doesnโt orchestrate remediation.
What SBOM Gets Wrong (or rather, what we get wrong about it)
- The Data Format Fallacy: Knowing what’s in your software is step zero. Not step 10.
- The Scale Blindspot: Try tracking thousands of versions, environments, and permutations without automation. Good luck.
- The Attestation Delusion: “Secure by default” becomes “secure by declaration” when the system lacks enforceability.
Where We Actually Need to Go
We donโt need another format. We need to operationalize vulnerability management in the supply chain. That means building systems that translate awareness into actionโat scale, at speed.
Hereโs what that looks like:
- Risk Prioritization at Scale: Move beyond CVSS and base scores. Leverage context: exploitability, business impact, asset sensitivity, to decide what actually matters.
- Automated Remediation: Manual patching is dead. Automation isnโt optional anymore; itโs survival.
- Embedded Security Posture Management: Bake risk assessment into development, procurement, and deployment pipelines.
- Cross-Functional Ownership: Security doesnโt belong to one team. Itโs distributed. Vendors, devs, ops, productโฆ all must align around shared accountability.
Recommendations
- For Policymakers: Incentivize operational excellence, not compliance paperwork. Invest in programs that reward integration, automation, and real-time visibility.
- For Vendors: Stop outsourcing security posture to your legal team. Replace attestation letters with actual risk data.
- For Cybersecurity Leaders: Push your stack to deliver outcomes, not optics. SBOM doesnโt reduce risk. Your processes do.
Final Thought
SBOM is necessary but wildly insufficient on its own. If we keep treating it like the holy grail, weโll stay stuck in the same cycle: transparency without action, awareness without accountability.
To truly secure the supply chain, we need more than inventory. We need impact. That means embedding vulnerability management into the bloodstream of how software is built, deployed, and maintained.
Because until we can act at the speed of exploitation, weโre just spectators in our own security program.
Until next time.
See Nucleus in Action
Discover how unified, risk-based automation can transform your vulnerability management.