STP
SBOM Observer/

Artifact Fundamentals

Terminology, requirement levels, roles, and core concepts for transparency artifacts

Requirements terminology

This documentation uses a consistent set of terms to indicate the importance of each requirement. The terminology is based on common usage in technical standards (such as RFC 2119), adapted to ensure clarity when preparing and evaluating SBOMs, VEX files, and VDRs.

  • Must / Shall / Required — the item is mandatory. It must be included or fulfilled to comply with the requirements.
  • Should / Recommended — the item is strongly advised, but not strictly mandatory. In specific cases, valid reasons may exist to omit it.
  • May / Optional — the item is not required. Its inclusion is at the discretion of the supplier or dependent on the use case.

Negative forms such as not required or not recommended follow the same logic.

These terms are applied throughout this site to help distinguish between essential elements, preferred practices, and areas where flexibility is allowed. They are also used as a basis for automated validation, where tooling can check whether submitted artifacts meet mandatory requirements and highlight deviations from recommended practices.

Terminology

The following terms are used throughout this site. Definitions are based on commonly accepted usage within the software supply chain and SBOM standards. Where applicable, meanings are consistent with those in CycloneDX and SPDX.

TermFull nameDescription
AdvisorySecurity AdvisoryAn official statement from an organization related to a security vulnerability, providing information, guidance, or mitigation about a threat
ArtifactThe specific file(s) and other digital material that make up the software described by the SBOM
ComponentA distinct unit of software, such as a library, module, framework, or service, that is part of a larger software product or system
CPECommon Platform EnumerationA structured naming scheme for software components used in vulnerability databases such as the NVD
CSAFCommon Security Advisory FrameworkA standardized framework for publishing vulnerability information, including VEX statements
CVECommon Vulnerabilities and ExposuresAn identifier given to a unique vulnerability in software, maintained by the Mitre Corporation
CWECommon Weakness EnumerationA community-developed list of software security weaknesses, serving as a common language for describing vulnerabilities
CycloneDXCycloneDXA lightweight SBOM standard format designed for use in application security contexts and supply chain component reviews
CycloneDX VEXCycloneDX Vulnerability Exploitability ExchangeAn extension of CycloneDX for conveying exploitability details of specific software vulnerabilities
DependencyA software component that another component requires in order to function correctly. Dependencies can be direct or transitive
EPSSExploit Prediction Scoring SystemA system predicting the likelihood that a vulnerability will be exploited in the wild within the next 12 months
OpenVEXOpen Vulnerability Exploitability ExchangeA format for conveying details of how specific software vulnerabilities can be exploited
ProvenanceThe origin and history of a component, including where it came from and how it was built
PURLPackage URLA standard identifier for software packages used to describe component origin in a consistent format
SCASoftware Composition AnalysisAn automated process that identifies open source components in software
SBOMSoftware Bill of MaterialsA list detailing components that make up software — an "ingredients list" for software
SLSASupply-chain Levels for Software ArtifactsA framework describing assurance of software artifacts based on the robustness of their software supply chain
SPDXSoftware Package Data ExchangeA standard format for communicating SBOM information including component license, copyright, and security details
SBOM SubjectThe software described by the SBOM document
VDRVulnerability Disclosure ReportA report detailing vulnerabilities in software, issued after discovery and vendor coordination
VEXVulnerability Exploitability eXchangeA format for conveying details of how specific software vulnerabilities can be exploited
VulnerabilityA weakness or flaw in software, hardware, or online service that can be exploited to perform unauthorized actions

Roles

This section defines the primary roles involved in producing, delivering, and using the artifacts described on this site.

Supplier

The Supplier is any organization responsible for producing and delivering SBOMs and related artifacts. This role may be fulfilled by software vendors, system integrators, manufacturers, or other entities in the software supply chain.

The Supplier's responsibility covers the entire software stack delivered, including components from subcontractors, integrators, or open source maintainers.

Consumer

The Consumer is any entity that receives and processes SBOMs, VEX files, and VDRs from Suppliers. Consumers can represent different stakeholders depending on the context, such as procurement teams, operators, application security functions, compliance officers, or industry partners.

Grouping these varied needs under one role provides a consistent way to refer to those who rely on SBOMs and related artifacts for risk assessment, compliance, and operational assurance.

See the Role-based Guides for detailed workflows per role.

On this page