Guidance on what information to include, why it is needed, and how to describe SBOM, VEX, and VDR use cases consistently.
{
"bomFormat": "CycloneDX",
"metadata": {
"timestamp": "2026-02-26T10:45Z"
},
"component": "example-api@2.4.1",
"vulnId": "CVE-2026-1234"
}Practical workflows for producing, distributing, and using SBOM, VEX, and VDR artifacts across producer and consumer teams.
Track maturity over time and prioritize the highest-value improvements.
The Software Transparency Framework
Three practical pillars: what to include, how to run it, and how to track progress.
Content Requirements
Field-by-field guidance for SBOMs, VEX, and VDR. Learn exactly what information belongs in your transparency documents with real-world examples.
Operational Model
End-to-end workflows for producers and consumers. How to generate, distribute, and integrate transparency data into your security pipeline.
Maturity Assessment
Measure your current capabilities and identify gaps. A structured self-assessment to benchmark your organization and prioritize improvements.
Built with industry-leading standards
Start Your Journey
Pick the path that fits your role in the software supply chain.
Producer
You manufacture, supply, or distribute software. Learn what to provide and how to communicate vulnerability impact effectively.
Consumer
You procure and secure software. Understand how to request, interpret, and integrate vendor transparency data.
Explorer
New to transparency? Browse the full framework, understand the pillars, and find where to start based on your needs.
Build your software
transparency foundation.
Join the community of organizations implementing open standards for a more secure and transparent software supply chain.
Initiative Funded By
Aligned with global regulations
