Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/AI Index
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Generative AI
      • Partners Ecosystem
      • Process Mining
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Summits
      • Roundtables
      • Video Moments
    • By Vendors
      • All Vendors
      • AI/Hyperautomation
      • Cloud
      • Cybersecurity
      • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • Courses
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/AI Index
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Generative AI
          • Partners Ecosystem
          • Process Mining
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Summits
          • Roundtables
          • Video Moments
        • By Vendors
          • All Vendors
          • AI/Hyperautomation
          • Cloud
          • Cybersecurity
          • Data
  • Courses
    • Cloud Wars Top 10
    • Selling AI, Cloud, Data & Cybersecurity
    • The Demise of Traditional Go-To-Market Strategies
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Leading SBOM Standard CycloneDX Now Incorporates Machine Learning
Cybersecurity as a Business Enabler

Leading SBOM Standard CycloneDX Now Incorporates Machine Learning

Bill DoerrfeldBy Bill DoerrfeldSeptember 6, 2023Updated:September 6, 20235 Mins Read
Facebook Twitter LinkedIn Email
OWASP CycloneDX
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

OWASP, the Open Worldwide Application Security Project, recently announced an update to the Bill of Materials (BOM) industry standard specification, CycloneDX. Of its notable improvements, CycloneDX version 1.5 now supports describing machine learning (ML) models. The enhancement comes at a time of increased excitement around the next generation of AI.

More organizations are training, deploying, or consuming machine learning, such as large language models (LLMs). But transparency into new AI areas is crucial since these models run the risk of becoming compromised by poisoned training data or supply chain attacks on the components they rely upon. Simultaneously, there is growing interest in using software bill of materials (SBOMs) to improve visibility into the dependencies that make up modern software.

Below, I’ll review CycloneDX and peak into the features of its latest incarnation. I also met with Jamie Scott, Founding Product Manager, Endor Labs, which is on the Acceleration Economy Cybersecurity Top 10 Shortlist, to gather more context around the SBOM release and why it matters for the industry. Together, we’ll explore CycloneDX’s role in maintaining transparency throughout tomorrow’s AI-driven software development lifecycle.

Introduction to CycloneDX

For those unfamiliar, OWASP CycloneDX specification is an SBOM format. Supported by many large enterprises and government institutions, CycloneDX has become a well-adopted method extensible to various contexts, such as software, software-as-a-service (SaaS), operations, and manufacturing.

The actual object model is defined in JSON Schema, XML Schema, and Protocol Buffers. It consists of areas such as metadata, components, services, dependencies, compositions, and vulnerabilities. The high-level object model is organized as follows:

CycloneDX High-Level Object Model

Coalescing on an SBOM standard helps the industry build tooling to counter supply chain threats. Some of these capabilities include more seamless SBOM generation and sharing, auditing, and automated vulnerability alerts.

CycloneDX Version 1.5 Introduces ML-BOM

Now that we have a basic understanding of CycloneDX, what’s special about this release? Well, as of v1.5, CycloneDX incorporates machine learning transparency (ML-BOM). This standard introduces a common way to define the training datasets and deployment methods used behind machine learning models. The goal is to increase ML transparency for all stakeholders, from providers to consumers, resellers, and end-consumers.

Specifically, as noted in the updated documentation, “machine-learning-model” is now a possible “component” type. By creating an ML-BOM, relevant technology providers could define loads of metadata, such as version, supplier, copyright, release notes, and more, along with dependency relationships and vulnerabilities, in a standardized way. Accordingly, ML-BOMs can help “provide visibility into possible security, privacy, safety, and ethical considerations.”

The machine learning space is growing rapidly, but we haven’t had the same degree of visibility into data sources and potential vulnerabilities as traditional software. According to Scott, the next logical step is to get visibility into machine learning models holistically, helping consumers make an informed decision on what to use or not to use.

“This release is significant because it sets a more prescriptive direction that tool providers can align to in order to start building the necessary bridges to align the industry with the software transparency movement.”

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

SBOM Benefits

The biggest issue in the SBOM movement is that data is fragmented significantly across many tools, said Scott. But, the latest CycloneDX release establishes a path to what is appropriate data for an SBOM, helping unite these fragmented ecosystems with more prescriptive information to inform risk management, he said.

Increased transparency into underlying components could also help reduce wasted efforts. For example, Endor Labs’ “State of Dependency Management 2023” report found that 60% of the time developers spend fixing open-source vulnerabilities is wasted because it’s focused on fixing flaws that can’t be exploited in their applications since they’re not reachable. Evidently, greater insight into dependency correlations could help streamline efforts.

Machine-readable SBOMs are also an excellent boon for industry-wide standardization and security compliance automation. Yet, of course, there is still a long way to go to fully realize the benefits of SBOMs. Namely, the industry needs greater maturity and operationalization around SBOM usage, noted Scott. To get there, we need more prescriptive guidelines that request more than the minimum data. Codifying and sharing practices internally and actually acting on found vulnerabilities will be necessary to reap the rewards of SBOMs (and ML-BOMs, for that matter).

The Early Stage of ML and ML-BOMs

We’re still in the early days of machine learning. Both the models themselves and security controls are at a very nascent stage, described Scott. For instance, there is nearly zero vulnerability data for ML models, and the training data that power them is often opaque. This makes determining risk when comparing models to be tricky.

Therefore, incorporating machine learning transparency into the SBOM movement is positive progress in spreading awareness of ML components and related risk information. And, since OWASP CycloneDX is the most widely used BOM format, it makes sense to standardize around this format to improve supply chain risk awareness around ML.


for more cybersecurity insights, visit the cybersecurity channel

Interested in Endor Labs?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Artificial Intelligence Cybersecurity data featured Machine Learning Open-Source Software SaaS supply chain vulnerability Vulnerability management
Share. Facebook Twitter LinkedIn Email
Analystuser

Bill Doerrfeld

Tech Journalist
Editor-in-Chief

Areas of Expertise
  • Cybersecurity
  • Low Code/No Code
  • LinkedIn

Bill Doerrfeld, an Acceleration Economy Analyst focused on Low Code/No Code & Cybersecurity, is a tech journalist and API thought leader. Bill has been researching and covering SaaS and cloud IT trends since 2013, sharing insights through high-impact articles, interviews, and reports. Bill is the Editor in Chief for Nordic APIs, one the most well-known API blogs in the world. He is also a contributor to DevOps.com, Container Journal, Tech Beacon, ProgrammableWeb, and other presences. He's originally from Seattle, where he attended the University of Washington. He now lives and works in Portland, Maine. Bill loves connecting with new folks and forecasting the future of our digital world. If you have a PR, or would like to discuss how to work together, feel free to reach out at his personal website: www.doerrfeld.io.

  Contact Bill Doerrfeld ...

Related Posts

7 Highlights From Oracle CloudWorld

September 22, 2023

On Location: Oracle CloudWorld Keynote Highlights Generative AI Enhancements

Sponsored ContentSeptember 21, 2023

On Location at Automation Anywhere: Key Strategies and the Impact of Gen AI on Business Productivity

Sponsored ContentSeptember 21, 2023

On Location at Automation Anywhere Imagine: The Convergence of Generative AI and RPA

September 21, 2023
Add A Comment

Comments are closed.

Recent Posts
  • 7 Highlights From Oracle CloudWorld
  • On Location: Oracle CloudWorld Keynote Highlights Generative AI Enhancements
  • On Location at Automation Anywhere: Key Strategies and the Impact of Gen AI on Business Productivity
  • On Location at Automation Anywhere Imagine: The Convergence of Generative AI and RPA
  • Road to Community Summit North America: Dynamics GP, Learning, Forging Relationships

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

The State of Process Mining 2023: Unlocking Efficiency and Driving Customer Satisfaction

July 31, 2023

How Workday Creates Agile Monetization Opportunities for CFOs

June 21, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023

The Ethical and Workforce Impacts of Generative AI

May 26, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
  • Do not sell my information
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.