Home » CISA NSA Urge SBOM Adoption for Enhanced Cybersecurity

CISA NSA Urge SBOM Adoption for Enhanced Cybersecurity

September 03, 2025 • César Daniel Barreto

Security teams need to know: new SBOM guidance just dropped from CISA and NSA, along with 19 other countries. SBOMs—think ingredient labels for software—list every component, library, and dependency, so you get what’s running in your environment. The 2025 draft is Totally different from 2021—it pushes SBOMs toward automated security tools, which can actually help.

The most noticeable change is requiring cryptographic hashes for all software components, enabling you to verify if what’s in your SBOM is what’s really deployed. They added elements like license info, tool names, and generation context, trying to make SBOMs comprehensive enough (so your tools aren’t useless). It’s a shift from “here’s a PDF” to formats that fit snugly with your existing security stack.

Attackers leveraging this vulnerability can gain entry via unpatched components. Proper SBOMs with hashes and detailed component info allow cross-referencing against vulnerability databases in real-time – instead of the whack-a-mole CVE game. Federal agencies and infrastructure are getting the heat, but any organization with complex software supply chains needs to pay heed as compliance expectations rise.

Note that public comments are wanted by October 3rd. It’s obvious SBOM adoption is becoming essential—20 countries agreeing on it is a big deal. And if you’re not integrating SBOMs into your processes yet, start figuring it out—this isn’t disappearing.

author avatar

César Daniel Barreto

César Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.