SBOM Is Not the Savior – Addressing the Deeper Problems in Supply Chain Security

Scott Kuffer
June 18, 2025
Industry Perspectives
SBOM Is Not the Savior

This article was originally published on Scott’s Substack on June 3, 2025.

I hear a lot these days about SBOMs and how they are going to be the key to supply chain security accountability, to even include a Presidentialย Executive Orderย mandating SBOMs in the procurement process for federal agencies. There are multiple areas of research going on in this area, such as thisย Academic SBOM Repository. But before we get too far down the road,ย letโ€™s get one thing straight:ย SBOM isnโ€™t going to save us. Itโ€™s a transparency tool, not a solution. And treating it like a silver bullet for supply chain security is not just misguided: itโ€™s dangerous.

In theory, SBOM (Software Bill of Materials) promises visibility into the components that make up your software, enabling faster response when vulnerabilities emerge. But in practice, itโ€™s a Band-Aid on a broken process. Weโ€™re trying to standardize metadata while ignoring the operational chaos that happens downstream.

To put it plainly: the problem isnโ€™t that we donโ€™t know whatโ€™s in the software. Itโ€™s that we have no scalable, reliable process to do anything meaningful with that information.

Story 1: Risk Posture Reporting Fantasyland

In 2024, I sat in a room with federal policymakers and software industry leaders. The proposal on the table? A framework where vendors report the risk posture of all shipped software on a recurring basis.

The response from industry?

โ€œWe donโ€™t even know what versions are running out there in the wild.โ€

โ€œInstead, can we sign attestation letters that say itโ€™s secure?โ€

Let that sink in. They couldnโ€™t inventory deployed versions across environments but were perfectly fine checking a compliance box. This is what the SBOM ecosystem is becoming, compliance theater masking operational dysfunction. If CVE management is a mess, try tracking risk through firmware, dependency chains, and runtime variants. Itโ€™s chaos on a good day.

Story 2: Vulnerability Management Shouldnโ€™t Exist?

Rewind to 2022. At a founderโ€™s dinner in San Francisco, a bright-eyed startup founder asked about my company. I told her we build vulnerability management software.

Her reaction? A grimace, followed by:

โ€œI donโ€™t think vulnerability management should even exist.โ€

The idea? If we fix the software supply chain, bugs go away. In theory, maybe. In reality? Laughable. Software is human. Vulnerabilities are inevitable. And the notion that you can code your way out of the need for operational security is Silicon Valley magical thinking.

SBOM: Insight Without Action

The core issue isnโ€™t with SBOM as a concept. Itโ€™s with how weโ€™ve mythologized it. SBOM is a data format. Thatโ€™s it. It doesnโ€™t patch anything. It doesnโ€™t assess risk. It doesnโ€™t orchestrate remediation.

What SBOM Gets Wrong (or rather, what we get wrong about it)

  • The Data Format Fallacy: Knowing what’s in your software is step zero. Not step 10.
  • The Scale Blindspot: Try tracking thousands of versions, environments, and permutations without automation. Good luck.
  • The Attestation Delusion: “Secure by default” becomes “secure by declaration” when the system lacks enforceability.

Where We Actually Need to Go

We donโ€™t need another format. We need to operationalize vulnerability management in the supply chain. That means building systems that translate awareness into actionโ€”at scale, at speed.

Hereโ€™s what that looks like:

  • Risk Prioritization at Scale: Move beyond CVSS and base scores. Leverage context: exploitability, business impact, asset sensitivity, to decide what actually matters.
  • Automated Remediation: Manual patching is dead. Automation isnโ€™t optional anymore; itโ€™s survival.
  • Embedded Security Posture Management: Bake risk assessment into development, procurement, and deployment pipelines.
  • Cross-Functional Ownership: Security doesnโ€™t belong to one team. Itโ€™s distributed. Vendors, devs, ops, productโ€ฆ all must align around shared accountability.

Recommendations

  • For Policymakers: Incentivize operational excellence, not compliance paperwork. Invest in programs that reward integration, automation, and real-time visibility.
  • For Vendors: Stop outsourcing security posture to your legal team. Replace attestation letters with actual risk data.
  • For Cybersecurity Leaders: Push your stack to deliver outcomes, not optics. SBOM doesnโ€™t reduce risk. Your processes do.

Final Thought

SBOM is necessary but wildly insufficient on its own. If we keep treating it like the holy grail, weโ€™ll stay stuck in the same cycle: transparency without action, awareness without accountability.

To truly secure the supply chain, we need more than inventory. We need impact. That means embedding vulnerability management into the bloodstream of how software is built, deployed, and maintained.

Because until we can act at the speed of exploitation, weโ€™re just spectators in our own security program.

Until next time.

Scott Kuffer
Scott is the co-founder and Chief Product Officer of Nucleus Security, a leading provider of risk-based vulnerability management solutions. With a wealth of experience in cybersecurity, SaaS, and business strategy, he has been at the forefront of driving innovation in vulnerability management, helping some of the worldโ€™s most complex enterprises tackle their biggest security challenges.

See Nucleus in Action

Discover how unified, risk-based automation can transform your vulnerability management.