
By Chuck Brooks and Georgianna Shea
We’ve learned the hard way that knowing what’s in your software supply chain matters. The Software Bill of Materials (SBOM) progressed from a niche best practice to government regulation codified under Executive Order 14028) and an operational necessity because it gives enterprises the visibility they need to discover, evaluate, and remediate risk before an exploit becomes a catastrophe.
Today, SBOMs are embedded in procurement expectations, federal acquisition language, and emerging regulatory practice. Hardware Bills of Materials (HBOMs) are increasingly referenced in supply chain risk management for critical infrastructure and defense systems. Both are moving toward structured formats, interoperability standards, and compliance reporting.
Cryptography now sits in the same position that software components occupied five years ago. SBOMs gained urgency when it became clear that unknown dependencies were the attack surface; the Log4Shell vulnerability in late 2021 exposed how invisible components could cascade into enterprise-wide exposure.
Cryptography faces an analogous reckoning: algorithms and keys embedded invisibly across systems, with no inventory, no ownership, and no migration plan. The difference is that the cryptographic threat horizon , quantum-capable adversaries, are less forgiving than a software patch cycle. You cannot hot-fix a compromised algorithm after Q-Day arrives.
Enterprises must inventory and manage their cryptographic assets with the same rigor applied to code, hardware, and data. Enter the Cryptography Bill of Materials (CBOM): an organized inventory of every cryptographic algorithm, implementation, key, certificate, random-number generator, and crypto-service provider utilized across an organization's systems.
In many enterprises, cryptographic usage is fragmented, undocumented, and operationally opaque. When boards are told that systems are "encrypted," that statement is often directionally true but operationally shallow. Encrypted with what? Where? For how long? Managed by whom? Rotated how? Replaced when?
Unlike SBOMs and HBOMs, CBOMs currently carry no formal regulatory requirement, no mandated schema, no federal minimum data elements, no standard reporting format. That absence should not be mistaken for irrelevance. It creates space for enterprises to act ahead of mandate rather than scramble to comply after one.
A CBOM can stand alone as an operational risk-management instrument, or augment existing SBOM and HBOM practices, extending component transparency into the trust layer those components rely on. SBOMs tell you what software is present. HBOMs tell you what hardware is embedded. A CBOM tells you what assumptions secure both.
If SBOMs map the parts, CBOMs map the trust.
Two concurrent developments raise the stakes for cryptographic visibility.
First, artificial intelligence is transforming both offense and defense. AI-driven tools accelerate code discovery, automate vulnerability research, and can rapidly detect weak or misconfigured cryptographic primitives across complex environments. That capability is available to adversaries as much as defenders making the ability to swiftly discover and characterize your own cryptographic assets essential before someone else does it for you.
Second, quantum computing is no longer theoretical. The prospect of cryptanalytically relevant quantum computers and what practitioners call "Q-Day" forces organizations to plan migration strategies now. Widely used public-key algorithms (RSA, ECC) are vulnerable to future quantum attacks, and long-lived data encrypted today could be decrypted later under a harvest-now, decrypt-later strategy: adversaries collect ciphertext today and break it when quantum capability matures. The timeline remains uncertain. The risk does not.
Without a CBOM, migration planning becomes guesswork. Leaders cannot answer basic operational questions:
Inventory does not solve the problem. It makes the problem measurable, and measurable problems can be prioritized, resourced, and tracked to resolution.
A well-constructed CBOM is more than a checklist. It is a machine-readable, continuously updated data model that relates cryptographic objects to system ownership, risk classification, and lifecycle metadata. At minimum it should capture:
Tooling to generate CBOMs is maturing. Open-source options such as the CycloneDX CBOM schema and GitHub-integrated scanners can extract cryptographic metadata from builds, containers, firmware, and infrastructure-as-code templates. For a CBOM to become a regular operational artifact rather than a one-time audit exercise, generation should be integrated into CI/CD pipelines and asset-management systems from the outset.
A CBOM answers the most critical questions for migration planning: where are vulnerable algorithms deployed, how long will the protected data remain sensitive, which keys and certificates are long-lived, and which implementations are difficult or risky to replace?
With that foundation, organizations can apply structured migration practices:
CBOM success requires governance alignment, automation, and integration and not just a one-time inventory exercise.
We cannot protect what we cannot see. SBOMs demonstrated that transparency into components turns unknown unknowns into manageable risk. In an era where AI accelerates adversary reconnaissance and quantum computing undermines the foundational assumptions of public-key security, a Cryptography Bill of Materials is an operational requirement - not a checkbox.
It gives executives the inventory, context, and programmatic control needed to prioritize migrations, harden implementations, and maintain confidence as the threat landscape shifts beneath them.
To begin: scope a CBOM for your highest-risk services today. Catalog algorithms, key stores, certificates, and RNG provenance. Feed that data into your risk and patching pipelines. Incorporate CBOM generation into your build and procurement workflows. The migration clock is already running and gaining visibility is how you get ahead of it.
We shortened our vulnerability review timeframe from a day to under an hour. It is our go-to tool and we now know where to focus our limited security resources next.

SBOM Studio saves us approximately 500 hours per project on vulnerability analysis and prioritization for open-source projects.
