Kiuwan logo

SBOM Reports: What to Include and How to Use Them

SBOM-Reports-What-to-Include-and-How-to-Use-Them-blog-image

An SBOM report, short for Software Bill of Materials, is a structured inventory of every component in a software application, including:

  • open-source libraries
  • third-party dependencies
  • version numbers
  • licenses
  • supplier details

For DevSecOps teams, security engineers, and compliance officers, an SBOM report is the foundation of software supply chain visibility.

This article covers what a complete SBOM report needs to include, which format to use and when, and how to turn a static inventory into an active part of your vulnerability management and compliance workflow.

TL;DR

  • Every useful SBOM report should capture core component data such as names, version numbers, supplier information, dependency relationships, and timestamps. In practice, most teams also treat licensing data as essential.
  • CycloneDX and SPDX are the two dominant formats, but they serve different primary use cases, so many teams benefit from supporting both.
  • The real value of an SBOM comes from keeping it current and cross-referencing it against vulnerability databases, not just generating it once.
  • Federal software procurement guidance, FDA cybersecurity expectations, and PCI DSS 4.0 are all pushing organizations toward stronger software inventory and supply chain transparency practices.
  • Kiuwan Insights integrates SBOM generation and export into existing SCA and CI/CD workflows, helping teams avoid the “SBOM that never gets updated” problem.

What is an SBOM report?

An SBOM report is a formal, machine-readable document that lists every component your software depends on, including first-party code, open-source libraries, and third-party packages, along with the metadata needed to identify, track, and assess each one.

The concept borrows from manufacturing, where a bill of materials lists every part in a physical product. In software, the equivalent is a complete dependency graph: what’s in the application, where it came from, what version is running, and what license governs its use.

But there’s a real difference between an SBOM that exists and one that’s operationally useful.

Many organizations produce SBOMs as a compliance checkbox, as a file that validates against a schema and satisfies an audit request. That’s not the same as an SBOM that’s integrated into your build process, kept current with every release, and actively used for vulnerability tracking.

The gap between those two states is where most software supply chain risk actually lives.

Six fields every SBOM report must include

A practical SBOM report needs a set of core fields for each component. Missing or placeholder values in any of them weakens the report’s usefulness.

FieldWhat it captures
Component nameThe name of each library, package, or module in the application
Version numberThe exact version running, not a range or “latest.”
Supplier informationThe organization or maintainer that produced the component
Unique identifiersStandard identifiers such as PURL, CPE, or other package references that make components easier to track across tools
Dependency relationshipsHow components relate to each other, including direct and transitive dependencies
Licensing dataThe license governing each component’s use
Timestamps / SBOM metadataWhen the SBOM was generated and the metadata needed to understand its provenance

Version numbers and dependency relationships matter more than the rest.

An SBOM that lists component names without pinned versions tells you almost nothing about your actual exposure. The same library, at two different versions can have entirely different vulnerability profiles.

Transitive dependencies, or the dependencies of your dependencies, are where most real-world supply chain risk hides. A complete SBOM surfaces both.

Following SBOM best practices means treating these fields as required, not optional.

SBOM formats compared: CycloneDX vs SPDX

Two formats dominate SBOM generation: CycloneDX and SPDX. They’re not interchangeable as each has a distinct origin, a primary use case, and a different set of tooling built around it.

What is CycloneDX?

CycloneDX is an open-source SBOM standard developed by OWASP and built specifically for application security and software supply chain risk management.

It also has strong support for VEX (Vulnerability Exploitability eXchange) workflows, which let you record not only which vulnerabilities exist in your components but also whether they’re exploitable in your specific application context.

If your primary audience is a security team, or if your regulatory context demands documented vulnerability analysis alongside inventory, CycloneDX is often the right pick.

What is SPDX?

SPDX (Software Package Data Exchange) is an ISO/IEC 5962-standardized SBOM format maintained by the Linux Foundation. It originated in license compliance and has been around longer than CycloneDX, which means it has a long track record and broad adoption across the software supply chain.

It’s often the format of choice when the primary audience is a legal or procurement team reviewing license obligations before a software acquisition or vendor assessment.

When to use CycloneDX vs SPDX

In practice, many teams benefit from generating both, depending on the context.

Security reviews and vulnerability disclosure workflows often call for CycloneDX. License audits and supplier assessments often call for SPDX. The format question is worth resolving early, ideally when you’re setting up SBOM standards for your organization, because retrofitting format support into existing pipelines is more work than building it in from the start.

CycloneDXSPDX
Primary focusSecurity and vulnerability trackingLicense compliance and software supply chain documentation
Maintained byOWASPLinux Foundation (ISO/IEC 5962)
VEX supportStrongMore limited for VEX-centric workflows
Best forSecurity teams, regulatory vulnerability disclosureLegal/procurement teams, license audits
Output formatsJSON, XML, Protocol BuffersTag-value, RDF/XML, JSON, YAML

How to use SBOMs for vulnerability management

Generating an SBOM is the easy part. The harder part is keeping it current and feeding it into your actual security workflow, not just letting it sit in a repository.

Cross-referencing SBOMs with vulnerability databases

An SBOM report becomes a vulnerability management tool the moment you cross-reference its component inventory against known vulnerability databases and CVE records.

Every component with a pinned version can be checked against published vulnerability data, giving you a real-time picture of which parts of your application are exposed and how severely. Without that cross-referencing step, an SBOM is an inventory, not an intelligence tool.

Automating SBOM generation in CI/CD pipelines

The most common failure mode for SBOM programs is stale data. An SBOM generated at initial release and never updated doesn’t reflect the dependencies you added in the last three sprints, the library you upgraded two weeks ago, or the transitive dependency that quietly introduced a new vulnerability.

Automating SBOM generation as part of your CI/CD integration means every build can produce a current, accurate inventory without anyone having to remember to run it.

That’s what turns an SBOM from a point-in-time snapshot into a living asset. The right SBOM tools make that automation straightforward to implement.

SBOM compliance requirements and regulatory mandates

SBOMs have moved from a security best practice to a common procurement, risk management, and regulatory expectation across several frameworks. If you’re operating in any of these contexts, SBOM generation is becoming harder to treat as optional.

SBOMs matter because modern software relies heavily on open-source and third-party components, and high-profile attacks like SolarWinds highlighted how invisible dependencies can create real, exploitable risk. Regulators and enterprise buyers responded by demanding more transparency into what ships inside software products.

Federal software supply chain guidance raised the profile of SBOMs in U.S. government procurement, and agencies may request or contractually require current SBOMs depending on the acquisition and risk context.

FDA cybersecurity guidance has also made SBOMs an expected part of many cyber device and medical device software submissions, where software transparency is relevant to review.

PCI DSS 4.0 strengthens requirements around software inventory, bespoke and custom software, and third-party components, which makes SBOMs useful evidence even though the standard does not explicitly require a formal SBOM.

Regulation/frameworkScopeSBOM relevance
Federal software procurement guidanceU.S. federal government software suppliersSBOMs may be requested or contractually required, depending on agency needs
FDA premarket cybersecurity guidanceCyber devices and relevant medical device software submissionsSBOMs are often expected as part of software transparency documentation
PCI DSS 4.0Organizations handling payment card dataInventory and component tracking requirements that SBOMs can help support

The trend is clear: SBOMs are becoming a standard expectation across regulated industries and security-conscious procurement environments. Building the capability now, before a customer or mandate forces the issue, puts you in a stronger position than scrambling to produce documentation retroactively.

How Kiuwan Insights automates SBOM reporting

Generating an SBOM once is a solved problem. Generating one that’s accurate, up to date, and integrated into your existing security workflow is where most teams need support, and that’s what Kiuwan Insights helps with.

Software composition analysis (SCA) is the process of identifying all open-source and third-party components in a codebase, mapping their licenses, and flagging known vulnerabilities. SCA tools often generate SBOMs as a core output.

Kiuwan Insights is a software composition analysis platform that can generate and export SBOMs as part of existing SCA and CI/CD workflows. Rather than relying on a manual scan at the point of release, teams can use it to keep SBOM data aligned with the actual state of the codebase. That reduces the most common failure mode: the SBOM that exists on paper but hasn’t been updated since the initial scan.

Here’s what Kiuwan Insights delivers for teams managing SBOM reporting and software supply chain compliance:

  • CycloneDX report generation that produces standard-compliant SBOMs ready for security reviews, regulatory submissions, and procurement requests
  • Open-source component tracking across your entire codebase, including transitive dependencies that manual reviews typically miss
  • License identification and monitoring, so you know exactly what license obligations your dependencies carry before they become a legal issue
  • Vulnerability cross-referencing that flags known issues against your component inventory, giving your security team something they can act on instead of a static list
  • CI/CD integration that supports automated SBOM generation and export as part of existing workflows, helping keep your inventory current with less manual overhead
  • Software composition analysis that goes beyond inventory to assess the actual risk profile of your open-source dependencies

For development teams, security engineers, and compliance officers who need SBOM reporting that holds up under scrutiny, Kiuwan Insights turns a compliance requirement into a security asset.Try Kiuwan for free to see how it integrates with your existing pipeline.

In This Article:

Request Your Free Kiuwan Demo Today!

Get Your FREE Demo of Kiuwan Application Security Today!

Identify and remediate vulnerabilities with fast and efficient scanning and reporting. We are compliant with all security standards and offer tailored packages to mitigate your cyber risk within the SDLC.

Related Posts

SBOM Reports What to Include and How to Use Them
© 2026 Kiuwan. All Rights Reserved.