STP
SBOM Observer/

Supplier Transparency & Assurance

Evaluating vendor software composition and managing third-party risk

Software procurement traditionally operates on trust and marketing claims rather than verifiable evidence. Vendors assert their products are "secure," "well-maintained," and "compliant," but procurement teams lack concrete data to validate these claims. Organizations sign contracts worth millions based on assurances that cannot be independently verified until after deployment—when problems are expensive to fix.

SBOMs fundamentally change this dynamic by providing verifiable evidence of software composition. Rather than accepting vendor claims about component quality, procurement teams can inspect actual dependencies, assess maintenance practices, and identify supply chain risks before commitment. This transparency enables risk-based vendor selection rather than reputation-based guessing.

The Procurement Transparency Problem

Traditional software procurement follows a pattern that prioritizes vendor reputation over verifiable evidence:

Week 1-2: Requirements Definition Procurement team drafts RFP asking vendors about security practices, component management, update frequency. Questions are generic because team lacks visibility into what specifically to ask about.

Week 3-6: Vendor Responses Vendors provide marketing materials and attestations. "We follow secure development practices." "We maintain dependencies regularly." "We comply with industry standards." All statements are unverifiable and essentially identical across vendors.

Week 7-8: Evaluation Procurement scores vendors based on responses that are functionally indistinguishable. Decision defaults to brand recognition, pricing, or existing relationships. No concrete evidence of actual software composition or supply chain practices.

Month 3-6: Post-Deployment Discovery Security team begins using the software and discovers concerning patterns. Critical component hasn't been updated in two years. Vulnerable dependencies exist in production. No clear patching timeline from vendor. Procurement team frustrated: "They said they managed dependencies well."

Month 6+: Vendor Lock-In Despite discovering problems, organization is committed. Migration costs are prohibitive. Team must work around vendor's poor practices rather than selecting better alternatives.

The fundamental problem: procurement decisions are made without visibility into the actual software composition that determines long-term operational costs and risks.

SBOM-Enabled Procurement

The same procurement process with SBOM requirements:

Week 1-2: Requirements Definition RFP includes specific SBOM requirement: "Vendor must provide CycloneDX or SPDX SBOM for all deliverables, updated with each release, covering all direct and transitive dependencies."

Week 3: Vendor Pre-Qualification Some vendors cannot provide SBOMs, immediately revealing immature development practices. These vendors are excluded early, saving evaluation effort on unsuitable options.

Week 4-6: SBOM Analysis For vendors who provided SBOMs, procurement team (with security team support) performs concrete analysis:

Component age analysis reveals Vendor A uses dependencies averaging 18 months old, while Vendor B maintains dependencies within 6 months of latest releases. Concrete evidence rather than marketing claims.

Vulnerability analysis shows Vendor A's SBOM contains 12 known vulnerabilities (8 critical, 4 high severity). Vendor B's SBOM shows 3 vulnerabilities (all medium severity with published VEX documents explaining mitigations). Different risk profiles despite similar marketing claims about "security focus."

License analysis identifies Vendor A includes GPL-licensed components with copyleft obligations that conflict with organization's proprietary deployment model. Vendor B uses only permissive licenses compatible with requirements. Legal risk identified before contract signature.

Depth analysis shows Vendor A's dependency tree includes 347 transitive components (supply chain attack surface). Vendor B's architecture uses 89 components with clear justification for each. Different maintenance burden and risk exposure.

Week 7-8: Evidence-Based Evaluation Procurement scores vendors using objective, verifiable criteria. Vendor B scores higher despite higher licensing cost because total cost of ownership (including vulnerability remediation overhead, license compliance risk, and maintenance burden) is demonstrably lower.

Week 9: Negotiation with Evidence Contract negotiations include specific SLA requirements: "Vendor will provide updated SBOM within 24 hours of any release, publish VEX documents for disclosed vulnerabilities within 48 hours, and maintain dependency currency within published SLA targets."

Vendor B accepts these terms because they already follow these practices. Vendor A cannot commit, revealing their marketing claims about "regular updates" were aspirational rather than operational reality.

Month 3-6: Post-Deployment Verification Security team continuously monitors vendor-provided SBOMs for changes. When vulnerability is disclosed, team immediately queries vendor's VEX publication timeline. Vendor meets contractual obligations, providing confidence in long-term partnership.

The transformation: procurement decisions based on verifiable evidence of software composition rather than unverifiable marketing assertions.

Practical Implementation for Procurement Teams

Building procurement capability around SBOMs requires processes, training, and tool integration established before RFP cycles begin.

Phase 1: Procurement Policy Updates

Update procurement policies to include SBOM requirements as standard terms rather than optional nice-to-have requests.

Standard RFP language: "Vendor must provide Software Bill of Materials (SBOM) in CycloneDX or SPDX format for all software deliverables. SBOM must include all direct and transitive dependencies with version information, license details, and known vulnerability references. Updated SBOM must be provided with each software release or update, delivered within 24 hours of release availability."

Evaluation criteria: Establish scoring rubrics that reward SBOM provision and penalize absence. Vendor provides comprehensive, timely SBOM: +10 points. Vendor provides partial or delayed SBOM: +5 points. Vendor cannot provide SBOM: 0 points (and potentially disqualifying depending on risk tolerance).

Contract requirements: Include SBOM delivery and update obligations in standard contract terms. Specify format requirements, delivery timelines, update frequency, and VEX publication expectations. Make these obligations enforceable with penalties for non-compliance rather than discretionary "best effort" language.

Existing vendor retrospective requirements: For vendors already under contract, add SBOM requirements at renewal. "Continued partnership requires SBOM provision beginning with next major release." Gives existing vendors time to implement capability while establishing expectation that transparency is non-negotiable.

Phase 2: Cross-Team Collaboration

Procurement teams rarely have deep technical expertise to analyze SBOMs independently. Effective SBOM-based procurement requires collaboration between procurement, security, and legal teams.

Procurement team role: Define SBOM requirements in RFPs, enforce contract terms, manage vendor relationships, track compliance with delivery obligations.

Security team role: Analyze provided SBOMs for vulnerability profiles, component age, dependency complexity, maintenance practices. Provide risk scoring that informs procurement decisions. During vendor evaluation, security team produces summary: "Vendor A: High risk (12 critical vulnerabilities, stale dependencies). Vendor B: Medium risk (well-maintained, responsive to disclosures)."

Legal team role: Analyze license obligations in SBOM, identify copyleft risks, ensure compliance with organizational policies. Flag problematic licenses early: "Vendor C includes AGPL-licensed component incompatible with SaaS deployment model."

Regular coordination: Establish recurring meetings during procurement cycles where teams review vendor SBOMs together. Procurement asks: "Can they deliver what we need?" Security asks: "Is it safe to operate?" Legal asks: "Can we legally use it as intended?"

Phase 3: Vendor Communication and Education

Many vendors will be unfamiliar with SBOM requirements when first encountered in RFPs. Procurement teams should anticipate questions and provide guidance.

FAQ for vendors: Develop standard responses to common vendor questions: "What format should we use?" "How detailed must it be?" "How often do you need updates?" Publish this guidance with RFPs so vendors understand expectations upfront.

Grace periods for strategic vendors: For vendors with unique capabilities but immature SBOM practices, consider phased requirements: "Initial contract requires basic SBOM within 6 months. Renewal requires comprehensive SBOM with VEX capability." Balances organizational needs with vendor capability development.

Industry education: Participate in industry groups and standards bodies to promote SBOM adoption. The more widespread SBOM requirements become across procurement organizations, the less resistance individual procurement teams face. Rising tide lifts all boats.

Positive reinforcement: When vendors exceed SBOM expectations, acknowledge this in vendor performance reviews and reference calls. Vendors who invest in transparency should benefit from reputation effects: "Vendor B was outstanding—they provided comprehensive SBOMs, responsive VEX updates, and proactive communication about component changes."

Phase 4: Ongoing Vendor Performance Monitoring

SBOM provision at contract signature is necessary but insufficient. Ongoing monitoring ensures vendors maintain commitments throughout partnership lifecycle.

Update timeliness tracking: Measure time between software release and SBOM delivery. Contract says 24 hours; actual performance is 18 hours average. Vendor is meeting obligations. Contract says 24 hours; actual performance is 72 hours average. Vendor is violating terms.

Quality assessment: Track SBOM completeness and accuracy over time. Do SBOMs consistently include all dependencies? Are transitive dependencies documented? When vulnerabilities are discovered in production that weren't listed in SBOMs, this indicates quality problems requiring vendor remediation.

VEX responsiveness: When vulnerabilities are disclosed affecting vendor components, track time to VEX publication. Vendor A publishes VEX documents within 48 hours of CVE disclosure (excellent). Vendor B takes 2+ weeks and only after customer prompting (concerning).

Trend analysis: Monitor changes in vendor practices over time. Is dependency age increasing (suggesting declining maintenance)? Is vulnerability count trending up (indicating problems)? These trends inform renewal decisions: "Vendor was good initially but has degraded—consider alternatives at renewal."

Vendor scorecards: Publish internal vendor performance scorecards including SBOM metrics. Makes performance transparent and creates accountability. Vendors who consistently excel get preferential consideration for new opportunities. Vendors who consistently underperform face renewal challenges.

Supplier Risk Scoring

SBOMs enable quantitative, repeatable risk assessment of vendor software composition rather than subjective judgment.

Vulnerability severity score: Count vulnerabilities by severity. Critical: 10 points each. High: 5 points. Medium: 2 points. Low: 1 point. Total score indicates immediate risk. Vendor with score of 50+ requires immediate attention. Score under 10 is acceptable maintenance baseline.

Component age score: Calculate average age of dependencies compared to latest available versions. Dependencies averaging under 6 months old: Low risk. 6-12 months: Medium risk. 12-24 months: High risk. 24+ months: Critical risk (indicates abandoned or poorly maintained software).

License risk score: Categorize licenses by compatibility with organizational usage. Permissive licenses (MIT, Apache): Low risk. Weak copyleft (LGPL, MPL): Medium risk. Strong copyleft (GPL, AGPL): High risk if incompatible with business model. Proprietary or unknown licenses: Critical risk requiring legal review.

Complexity score: Count total transitive dependencies. Under 100 components: Low complexity. 100-300: Medium complexity. 300-500: High complexity. 500+: Critical complexity (suggests architectural problems and significant maintenance burden).

Maintenance indicators: Track vendor responsiveness to vulnerability disclosures. VEX published within 48 hours: Excellent. Within 1 week: Good. Within 1 month: Concerning. Over 1 month or no response: Critical problem.

Composite risk rating: Combine individual scores into overall risk rating. Use weighted formula reflecting organizational priorities. Security-focused organization weights vulnerability severity heavily. Compliance-focused organization weights license risk heavily.

Real-World Procurement Scenario

Organization evaluating three vendors for customer identity management platform. Contract value €500K annually. Ten-year expected lifecycle.

Traditional evaluation (without SBOM): All three vendors claim "enterprise-grade security," "regular updates," and "compliance with industry standards." Marketing materials are indistinguishable. Evaluation defaults to pricing and existing customer references. Organization selects Vendor A (lowest cost).

Post-deployment discovery: Vendor A's software contains numerous outdated dependencies with known vulnerabilities. Patching is slow and unpredictable. Security team spends significant time compensating for vendor's poor practices. Total cost of ownership (including security overhead) exceeds initial licensing savings.

SBOM-enabled evaluation: RFP requires SBOMs. Vendor A provides SBOM showing 237 components including 15 known vulnerabilities (7 critical). Many dependencies 18+ months old. No evidence of systematic maintenance. Risk score: High.

Vendor B provides SBOM showing 89 components, 4 known vulnerabilities (all with published VEX documents explaining mitigations and timelines). Dependencies average 4 months old. Evidence of active maintenance. Risk score: Low.

Vendor C cannot provide SBOM, explaining "this is not standard practice in our industry." Reveals immature development processes. Risk score: Critical (disqualifying).

Organization selects Vendor B despite 15% higher licensing cost. Analysis shows total cost of ownership is lower due to reduced security remediation overhead, lower risk of breaches, and predictable maintenance patterns. SBOM evidence supported justification of higher upfront cost to executive stakeholders.

Five years later, organization's decision is validated. Vendor B has consistently delivered timely SBOMs and VEX updates, maintained dependencies proactively, and required minimal security team intervention. Vendor A (which another division selected before SBOM policies existed) has been constant source of security issues and operational overhead. Business case for SBOM-based procurement is proven through operational results.

Handling Vendor Resistance

Some vendors will resist SBOM requirements, claiming competitive sensitivity, excessive burden, or industry norm violations. Procurement teams should anticipate and address these objections.

"Our competitors will see our architecture": Response: "SBOM shows component list, not architecture or proprietary implementations. License information and dependency versions are not trade secrets. If transparency about components used is competitive disadvantage, this suggests you're using concerning components that well-run competitors are not."

"This is too much work to generate": Response: "Modern development tools generate SBOMs automatically as part of build processes. If SBOM generation is burdensome, this suggests manual or outdated build practices that create other risks we should discuss."

"Nobody else in the industry requires this": Response: "Regulatory requirements (NIS2, Cyber Resilience Act) are mandating SBOMs. Early adoption gives you competitive advantage as requirements become universal. We're happy to be reference customer demonstrating your forward-thinking practices."

"We can't commit to 24-hour update timelines": Response: "What timeline can you commit to? If SBOM updates require manual work, let's discuss your release processes. Automated SBOM generation enables fast delivery. If you can't deliver SBOMs quickly, we're concerned about your ability to deliver patches quickly during security incidents."

"This exposes us to liability": Response: "Transparency about components doesn't create liability—using vulnerable components creates liability. SBOM disclosure allows us to work together on risk management rather than discovering problems after incidents. Partners who share transparency build stronger relationships."

Integration with Existing Processes

SBOM-based procurement integrates with established vendor management and risk assessment processes rather than replacing them.

Vendor onboarding: Add SBOM collection to standard vendor onboarding checklist. New vendor completes security questionnaire AND provides SBOM for products in scope.

Vendor risk assessments: Incorporate SBOM analysis into periodic vendor risk reviews. Annual or quarterly reassessment includes updated SBOM review to identify changes in vendor practices.

Contract renewals: Include SBOM performance metrics in renewal discussions. Vendor has consistently met SBOM delivery obligations and maintained good component hygiene—favorable renewal terms. Vendor has been inconsistent or unresponsive—renegotiate terms or consider alternatives.

Incident response: When vendor-provided software is involved in security incident, immediately request current SBOM and relevant VEX documents. If vendor cannot provide quickly, this identifies process gaps requiring remediation.

Fourth-party risk: Extend SBOM requirements beyond direct vendors to their suppliers when feasible. "Your SBOM shows dependency on Component X from Vendor Y. Can Vendor Y provide SBOM for Component X?" Builds understanding of extended supply chain rather than stopping at immediate vendor.

Measuring Procurement Improvement

Track metrics demonstrating SBOM-enabled procurement impact:

Vendor transparency rate: Percentage of vendors able to provide SBOMs on request. Baseline (first year): 20% of vendors can provide SBOMs. Target (year 3): 80%+ can provide SBOMs. Improvement indicates market maturity and organizational influence.

Pre-contract risk identification: Number of vendors excluded or flagged due to SBOM analysis before contract signature. Measures prevention of poor procurement decisions. "We identified 3 high-risk vendors during evaluation this year that would have been selected under previous processes."

Vendor performance consistency: Track vendor SBOM delivery timeliness and quality over contract lifecycle. Vendors meeting SLA targets: Target 90%+. Consistent performance indicates effective vendor management.

Security overhead reduction: Measure security team time spent compensating for vendor software issues. Baseline: 30% of security team time spent on vendor-related vulnerabilities. Target with SBOM-based procurement: under 15%. Demonstrates efficiency gains from better vendor selection.

Total cost of ownership impact: Compare TCO for vendors selected with SBOM analysis vs without. Include licensing costs, security remediation overhead, compliance costs, incident response costs. Demonstrate SBOM-enabled procurement delivers lower TCO even when upfront licensing costs are higher.

Next Steps

On this page