Supply Chain Security Regulations Tracker

Track and explore SBOM and vulnerability management regulations across industries and jurisdictions. Filter by country, market segment, and compliance status to find the requirements that matter to your organization.
Industry
Loading...
Country / Region
Loading...
Loading regulations...

See Cybeats Security
Platform in Action Today

We shortened our vulnerability review timeframe from a day to under an hour. It is our go-to tool and we now know where to focus our limited security resources next.

Lead Security Architect, Product Supply Chain Security (June 2024)
10x
from days to under an hour

SBOM Studio saves us approximately 500 hours per project on vulnerability analysis and prioritization for open-source projects.

Lead Cyber Security Engineer
(June 2024)
500hrs
saved per project

Security of Critical Infrastructure and Other Legislation Amendment Act 2024

Australia

general

implicit

implicit

https://www.legislation.gov.au/C2024A00151/latest/text

April 3, 2026

N/A

Amends the SOCI Act 2018. Strengthens obligations for critical infrastructure owners on data storage protection, risk management programs, and telecom security. Schedule 5 uplifts telecom security obligations. Risk management program requirements implicitly require understanding of software components in critical infrastructure systems.

References security incidents and risk management for critical infrastructure. Risk management programs must address cyber threats. Telecom security uplift includes vulnerability management for network infrastructure. No specific vulnerability disclosure timelines.

Parliament of Australia

Nov 2024

Road Vehicles — Functional Safety

Global

automotive

implicit

implicit

https://www.iso.org/standard/68383.html

April 3, 2026

N/A

ISO 26262 does not name SBOM explicitly but creates strong implicit requirements through SOUP qualification (Part 8, Clause 12), which mandates identification, classification, and verification of all pre-existing software components — functionally equivalent to SBOM content. Configuration management (Part 8, Clause 7) requires traceability of all software elements. The SPDX Safety Profile (under development) maps SBOM data directly to ISO 26262 safety analysis needs. Growing interdependence with ISO/SAE 21434 cybersecurity standard means vulnerability tracking of safety-critical components increasingly requires component-level visibility that SBOM provides. SDV complexity makes manual component tracking infeasible.

ISO 26262 requires monitoring and managing safety-relevant software components throughout the product lifecycle. Interdependence with ISO/SAE 21434 means cybersecurity vulnerabilities in safety-critical ECU components pose direct safety risks, creating implicit requirements for vulnerability awareness and management of embedded software components.

ISO

Dec 2018

ISO/SAE 21434 — Road Vehicles: Cybersecurity Engineering

Global

automotive

implicit

explicit

https://www.iso.org/store.html

April 3, 2026

Not specified

Joint ISO/SAE international standard for cybersecurity risk management across the entire lifecycle of road vehicle E/E systems. Covers concept, development, production, operation, maintenance, and decommissioning. Clause 7 and Clause 13 require tracking of software components and their vulnerabilities. SBOM not named but component inventory and supply chain transparency are foundational requirements.

Full cybersecurity engineering lifecycle including TARA, continuous vulnerability monitoring, incident response, and supply chain cybersecurity management. Requires monitoring publicly reported vulnerabilities affecting vehicle E/E components.

ISO/SAE International

Aug 2021

PCI SSF — Secure Software Standard v1.0

Global

financial

implicit

explicit

https://www.pcisecuritystandards.org/document_library/

April 3, 2026

Not specified

References software dependencies and software lifecycle. Addresses secure software development practices including third-party component management. No explicit SBOM requirement.

Vulnerability handling processes, security update mechanisms for payment software

PCI SSC

v1.0

PCI DSS v4.0.1 — Payment Card Industry Data Security Standard

Global

financial

implicit

explicit

https://www.pcisecuritystandards.org/document_library/

April 3, 2026

Critical/high patches within 1 month, quarterly vulnerability scans, annual penetration tests

References software components, software composition analysis, third-party software controls, and software lifecycle management. Requirement 6.3 mandates identification of all bespoke and custom software including third-party components. No direct SBOM mention but Req 6.3.2 requires maintaining an inventory of bespoke and custom software and third-party components to facilitate vulnerability and patch management.

Comprehensive vulnerability management program: Req 6.2 requires vulnerability scanning. Req 6.3 mandates identification and remediation of vulnerabilities. Req 11 requires penetration testing. Critical/high patches within 1 month. Quarterly vulnerability scans. Annual penetration tests.

PCI SSC

v4.0.1

Shared Vision of SBOM for Cybersecurity

Global

general

explicit

explicit

https://www.cisa.gov/resources-tools/resources/shared-vision-secure-and-measurable-software-through-sbom-and-related-activities

April 3, 2026

N/A

Joint guidance authored by CISA, NSA, and 17 international cybersecurity agencies. Presents the shared international vision for SBOM adoption. Covers SBOM value proposition, vulnerability management, supply chain risk management, license compliance, software development lifecycle improvements, and SBOM sharing practices. References Log4Shell as a case study. TLP:CLEAR.

Joint 15 country guidance on SBOM for vulnerability management and supply chain risk. References Log4Shell as case study.

CISA/NSA + 17 International Partners

Sep 2025

Standardized Framework for Managing End of Life and Product Lifecycle Information

Global

general

explicit

explicit

https://github.com/oasis-tcs/openeox

April 3, 2026

N/A

Multi-organization global standard (Cisco, BSI, Red Hat, CISA, Dell, Oracle, Flexera). Explicitly references SBOM as the primary mechanism for delivering lifecycle/EoL data. Defines how EoL fields integrate into SBOM formats (CycloneDX, SPDX) and VEX documents. BOM refs: SBOM: p. 4

Defines end of security support lifecycle milestones, security patch availability periods

OpenEoX Community

Apr 2025

Legal Study on RED Potential Ramifications for FOSS

EU

telecom

implicit

none

https://digital-strategy.ec.europa.eu/en/library/study-impact-radio-equipment-directive

April 3, 2026

N/A

Legal analysis commissioned by FSFE examining whether RED Article 3(3)(i) software lockdown requirement conflicts with GPL-2.0, GPL-3.0, LGPL-2.1, and AGPL-3.0 license terms. Concludes lockdown requirement conflicts with copyleft licenses requiring users to install modified versions. References SPDX identifiers in the licensing context. Relevant to understanding FOSS/OSS software supply chain implications under RED and CRA. Implicit classification based on software component licensing and composition discussion.

Pure licensing/IP law study with no vulnerability management content. Analysis focuses on radio equipment software lockdown requirements and FOSS license compatibility, not cybersecurity or vulnerability management.

JBB Rechtsanwälte

May 2019

Implementing Decision 2025/138 — EN 18031 Harmonised Standards for RED

EU

telecom

none

implicit

https://eur-lex.europa.eu/eli/dec_impl/2025/138/oj

April 3, 2026

N/A

Administrative instrument (4 pages) that formally publishes EN 18031-1/2/3:2024 as harmonised standards for RED Art. 3(3)(d)(e)(f). The decision document itself contains no SBOM or software component requirements. The underlying EN 18031-1:2024 standard contains GEC-1 (General Essential Condition 1) which requires a software and hardware component list (effectively an SBOM/HBOM) and continuous vulnerability monitoring. EN 18031 standards themselves not stored separately.

Decision points to EN 18031-1/2/3:2024 as harmonised standards. The underlying EN 18031-1 standard includes GEC-1 requiring manufacturers to maintain lists of software/hardware components, identify publicly known exploitable vulnerabilities, and conduct continuous vulnerability monitoring throughout the product lifecycle. No specific disclosure timelines in the decision text.

European Commission

Jan 2025

EN 303 645 — Cyber Security for Consumer IoT: Baseline Requirements v2.1.1

EU

telecom

explicit

explicit

https://www.etsi.org/deliver/etsi_en/303645_303699/303645/02.01.01_60/en_303645v020101p.pdf

April 3, 2026

Not specified (disclosure policy must exist)

European baseline standard for consumer IoT cybersecurity. 13 top level provisions, 33 mandatory requirements, 35 recommendations. Adopted 19 Jun 2020. Section 3.3 defines "SBOM" as abbreviation for Software Bill of Materials (p. 12). Provision 5.2-3 (p. 15) explicitly describes building an SBOM to identify third party components and versions for vulnerability monitoring. Provision 5.2 requires secure update mechanisms. Provision 5.3 mandates public vulnerability disclosure policy. Provision 5.4 requires acting on security vulnerabilities in product software. Widely referenced in RED compliance and EU CRA alignment. BOM refs: SBOM: pp. 12, 15

Coordinated vulnerability disclosure policy, vulnerability reporting mechanism, security updates throughout defined support period

ETSI

Jun 2020

Cybersecurity in Medical Devices: QMS Considerations and Premarket Submissions (Feb 2026)

US

medical

explicit

explicit

https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cybersecurity-medical-devices-quality-system-considerations-and-content-premarket-submissions

April 3, 2026

Not specified (CVD plan + cybersecurity management plan required per Section 524B)

Supersedes the June 2025 guidance (GUI00001825). Issued February 3, 2026 to align with the new Quality Management System Regulation (QMSR) effective February 2, 2026, which harmonizes 21 CFR Part 820 with ISO 13485:2016. Replaces all QSR references with QMSR/ISO 13485 references. Substantive cybersecurity requirements unchanged from June 2025. Section VII.C.3 covers SBOM under Section 524B(b)(3) of the FD&C Act. Requires machine readable SBOM (SPDX or CycloneDX) for all cyber device premarket submissions. FDA can issue Refuse to Accept (RTA) for missing SBOM since October 1, 2025. Covers SPDF, threat modeling, security architecture, cybersecurity testing, transparency, and labeling. BOM refs: SBOM, Software Bill of Materials, Bill of Materials found

Supersedes June 2025 guidance. Aligns with QMSR/ISO 13485:2016. Substantive cybersecurity requirements unchanged. SBOM required for all cyber device premarket submissions. FDA RTA for missing SBOM since Oct 2025

FDA

Feb 2026

Cybersecurity in Medical Devices: Premarket Submissions (Updated Jun 2025)

US

medical

explicit

explicit

https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cybersecurity-medical-devices-quality-system-considerations-and-content-premarket-submissions

April 3, 2026

30 days customer notification after vulnerability discovery; patch timelines aligned to risk level

Released June 27, 2025. Supersedes the September 2023 guidance. Implements Section 524B of the FD&C Act, shifting cybersecurity from voluntary recommendations to enforceable legal requirements for "cyber devices." Major addition is Section VII covering 524B compliance. SBOM is now mandatory for all premarket submissions of cyber devices, not optional. Must adhere to NTIA minimum elements, provided in machine readable format (SPDX or CycloneDX preferred), listing all commercial, open source, and off the shelf components with version, supplier, license type, and end of support dates. SBOM treated as a living document, updated with every software release. Requires adoption of a Secure Product Development Framework (SPDF); lists IEC 81001-5-1 and AAMI SW76 as possible frameworks. Premarket submissions must include approximately 12 cybersecurity documents via eSTAR: SBOM, threat model and risk management plan (continuously updated during postmarket), coordinated vulnerability disclosure (CVD) policy, code review methods (SAST and DAST), defined patch/update timelines aligned to risk level, event detection and logging, supply chain cybersecurity risk management, security architecture views, and labeling/management plans. Requires customer notification within 30 days of vulnerability discovery. Distinguishes uncontrolled risks (immediate action) from controlled risks (scheduled maintenance). Noncompliance may result in refusal to accept or technical screening holds. Silent on legacy device compliance with 524B. BOM refs: SBOM: pp. 4, 16, 20-21, 33, 39-40, 49, 51, 53-54, 56, 62

Released Jun 27, 2025. Supersedes 2023 guidance. Implements Section 524B of FD&C Act making cybersecurity legally enforceable. Full vulnerability management lifecycle: mandatory CVD policy, SBOM as living document (NTIA minimum elements, SPDX/CycloneDX format) for continuous vulnerability monitoring, NIST NVD and CISA KEV monitoring, code review (SAST/DAST), vulnerability scanning, penetration testing, threat model continuously updated during postmarket surveillance, defined patch/update timelines by risk tier (uncontrolled = immediate, controlled = scheduled maintenance), end of support dates per SBOM component, event detection and logging, supply chain cybersecurity risk management. Requires SPDF adoption (IEC 81001-5-1 or AAMI SW76). Approximately 12 cybersecurity documents submitted via eSTAR. Noncompliance may result in refusal to accept. Silent on legacy device compliance.

FDA

Jun 2025

Postmarket Management of Cybersecurity in Medical Devices

US

medical

implicit

explicit

https://www.fda.gov/regulatory-information/search-fda-guidance-documents/postmarket-management-cybersecurity-medical-devices

April 3, 2026

Not specified (recommends "timely" disclosure)

Pre-SBOM/VEX era guidance (2016). Does not mention SBOM or VEX by name, but Section V.B (p.13) requires manufacturers to monitor third party software components for new vulnerabilities throughout the device's total product lifecycle, effectively mandating component-level inventory. Section IV.I (p.11-12) explicitly defines and requires threat modeling. Section VI (p.15-17) establishes CVSS 3.0 based risk assessment producing controlled vs uncontrolled risk determination. References ISO/IEC 29147:2014 (vulnerability disclosure) and ISO/IEC 30111:2013 (vulnerability handling). Conceptual foundation for SBOM and VEX requirements formalized in the 2023/2025 premarket guidance under Section 524B of FD&C Act.

Section V.B: continuous monitoring of OTS/third party components for vulnerabilities across full device lifecycle. Section IV.I: threat modeling required. Section VI: CVSS 3.0 risk assessment (controlled vs uncontrolled). ISO/IEC 29147:2014 disclosure, ISO/IEC 30111:2013 handling. Predates VEX but describes equivalent status communication.

FDA

Dec 2016

Framing Software Component Transparency: Establishing a Common SBOM (3rd Edition)

US

federal

explicit

explicit

https://www.cisa.gov/sbom

April 3, 2026

N/A

The foundational CISA SBOM framing document. Third edition updates and expands on the 2021 NTIA minimum elements. Defines SBOM attributes, baseline and aspirational maturity levels, new "license" and "copyright holder" baseline attributes. Section 3.6.1 covers Vulnerability Management and VEX integration. BOM refs: SBOM: throughout (300+ mentions); VEX: Section 3.6.1

Dedicated Section 3.6.1 on Vulnerability Management and VEX. Defines how VEX communicates vulnerability exploitability status for SBOM components. Covers not affected, affected, fixed, under investigation statuses

CISA

Sep 2024

Strategy for Cyber-Physical Resilience: Fortifying Our Critical Infrastructure

US

federal

explicit

implicit

https://www.whitehouse.gov/pcast/

April 3, 2026

N/A

Report to the President from PCAST (Biden administration). Recommends strengthening critical infrastructure resilience. Explicitly references SBOMs and VEX as tools for software transparency and vulnerability management. Recommends SBOM adoption across critical infrastructure sectors. Calls for standardised SBOM formats and automated SBOM processing capabilities.

Presidential advisory report on critical infrastructure resilience. References vulnerability sharing programs, vulnerability disclosure, bug bounty programs, and VEX. High-level policy recommendations without specific disclosure timelines or mandates. Recommends strengthening cyber incident information sharing and automated vulnerability tracking.

PCAST

Feb 2024

Memorandum M-26-05 — Risk-based Approach to Software and Hardware Security

US

federal

explicit

explicit

https://www.whitehouse.gov/wp-content/uploads/2026/01/M-26-05-Risk-Based-Approach-to-Software-and-Hardware-Security.pdf

April 3, 2026

N/A

OMB Director Russell Vought memo to all agency heads. Rescinds M-22-18 and M-23-16. Adopts risk-based approach, agencies may contractually require SBOM from software producers. References CISA 2025 SBOM Minimum Elements and HBOM Framework. BOM refs: SBOM, Software Bill of Materials, Bill of Materials found

Rescinds M-22-18 and M-23-16. Agencies may contractually require SBOM from software producers for vulnerability management. References CISA 2025 SBOM Minimum Elements and HBOM Framework

OMB

Jan 2026

Manual 5000.UY — Cyber Developmental Test and Evaluation (Draft)

US

federal

implicit

explicit

https://www.esd.whs.mil/Directives/issuances/dodi/

April 3, 2026

N/A

Draft manual (never finalized as 5000.UY; superseded by DoW Manual 5000.103, Feb 2026). Uses bills of materials (BOMs) substantively throughout: review of BOMs required during cyber DT&E initiation, BOM analysis for known vulnerability identification, and BOM provenance evaluation for supply chain risk. Defined in glossary as a formal record containing the details and supply chain relationships of various components used in building a system's firmware, hardware, and software. Companion Cyber DT&E Guidebook V3 (June 2025) includes Table F-1 on SBOM attribute analysis.

Extensive cyber DT&E vulnerability management requirements: cross-reference against National Vulnerability Database (NVD), identify and track known exploitable vulnerabilities, verify vulnerability remediation per DoDI 8531.01, assess simultaneous exploitation of multiple vulnerabilities. Vulnerability deficiencies reported through Joint Deficiency Reporting System. Supply chain risk management assessment integrated. No specific public disclosure timelines (internal DoD acquisition framework).

DoD

Comments on CISA 2025 SBOM Minimum Elements RFC

US

federal

explicit

explicit

https://www.regulations.gov/docket/CISA-2024-0030

April 3, 2026

N/A

Industry response to CISA's RFC. Explicitly discusses SBOM element retention, firmware SBOM, HBOM interoperability, and supply chain transparency. Useful for understanding regulatory intent and industry positions. BOM refs: SBOM: pp. 1-11 · CBOM: pp. 8-9 · HBOM: pp. 1, 10

Industry comments on SBOM vulnerability management capabilities, zero day response, vulnerability database integration

OpenPolicy

Oct 2025

Minimum Elements for a Software Bill of Materials (Draft 2025)

US

federal

explicit

explicit

https://www.cisa.gov/sbom

April 3, 2026

N/A

CISA's update to the original 2021 NTIA minimum elements. Public comment draft defining updated required SBOM fields, depth requirements, machine-readability, and automation expectations. Core SBOM regulatory document. BOM refs: SBOM: pp. 1-17

Defines minimum SBOM elements supporting vulnerability management and vulnerability database querying

CISA

Aug 2025

Software Bill of Materials Policy Memorandum

US

federal

explicit

explicit

https://www.army.mil/

April 3, 2026

N/A

Signed by Douglas R. Bush, Assistant Secretary of the Army (Acquisition, Logistics and Technology). Implements Army policy for SBOM use across all acquisition pathways (Software Acquisition, Urgent Capability, Middle Tier, Major Capability, Defense Business Systems). Requires PEOs/PMs to incorporate SBOM contract language in new solicitations, collect SBOMs from vendors for all covered computer software and COTS, securely store and continuously monitor SBOMs for vulnerability and incident management. Defines "covered computer software" broadly (government funded, contractor developed, commercial, COTS, and open source). Excludes cloud services. DASA(DES) to provide SBOM Management and Implementation Guide, sample contract language, and establish cross-PEO/PM SBOM Working Group within 90 days. References EO 14028, OMB M-22-18, M-23-16, Army Directive 2023-16, Army Directive 2024-02. BOM refs: SBOM, Software Bill of Materials, Bill of Materials found

Requires PEOs/PMs to collect SBOMs and continuously monitor for vulnerability and incident management. Mandates SBOM contract language in new solicitations across all acquisition pathways

U.S. Army ASA(ALT)

Aug 2024

Recommendations for SBOM Management v1.1

US

federal

explicit

explicit

https://media.defense.gov/2024/Jan/31/2003384210/-1/-1/0/CSI-SBOM-MANAGEMENT-RECOMMENDATIONS.PDF

April 3, 2026

N/A

NSA guidance for National Security Systems on SBOM management tooling. Covers SBOM ingestion, storage, analysis, CycloneDX, SPDX, VEX integration, and risk-based decision-making. Directly applicable to defense contractors and federal agencies. BOM refs: SBOM: pp. 1-14

SBOM as enabler for vulnerability management. Covers vulnerability database integration, vulnerability identification and remediation through SBOM analysis

NSA

Jan 2024

Software Supply Chain Security Guidance Under EO 14028 Section 4e

US

federal

explicit

explicit

https://www.nist.gov/system/files/documents/2022/02/04/software-supply-chain-security-guidance-under-EO-14028-section-4e.pdf

April 3, 2026

Not specified

Direct NIST implementation guidance for EO 14028. Explicitly defines SBOM minimum elements, outlines how agencies should request SBOM from software producers, and establishes the baseline for federal procurement SBOM requirements. BOM refs: SBOM: p. 7

Vulnerability disclosure programs for federal software producers, vulnerability scanning requirements

NIST

Feb 2022

Executive Order 14144 — Strengthening and Promoting Innovation in Cybersecurity

US

federal

implicit

explicit

https://www.federalregister.gov/documents/2025/01/21/2025-01670/strengthening-and-promoting-innovation-in-the-nations-cybersecurity

April 3, 2026

Not specified

Builds on EO 14028. References software supply chain security and third-party software risk management. Reinforces EO 14028 SBOM obligations and adds new requirements for software attestation and secure development practices. Does not repeat SBOM explicitly in the initial sections but relies on the EO 14028 framework. Extends to AI systems and cloud services.

Builds on EO 14028. Adds vulnerability management and patch management requirements for federal systems. Mandates vulnerability disclosure programs, security patch requirements, and continuous monitoring. Expands scope to AI systems and emerging technologies.

The White House

Jan 2025

Executive Order 14028 — Improving the Nation's Cybersecurity

US

federal

explicit

explicit

https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity

April 3, 2026

Not specified

The foundational US federal SBOM mandate. Section 4 explicitly directs NIST to define minimum SBOM elements and requires SBOM for software sold to the federal government. Triggered the entire US SBOM regulatory ecosystem. BOM refs: SBOM: pp. 6-7, 14

Foundational US federal cybersecurity EO. Mandates vulnerability disclosure programs, penetration testing for federal software

The White House

May 2021

Securing the ICTS Supply Chain: Connected Vehicles (15 CFR Part 791)

US

automotive

explicit

explicit

https://www.federalregister.gov/documents/2025/01/16/2025-00592/securing-the-information-and-communications-technology-and-services-supply-chain-connected-vehicles

April 3, 2026

N/A

Final rule from the Bureau of Industry and Security addressing ICTS supply chain security for connected vehicles. Explicitly references SBOM as a tool for assessing software provenance and foreign adversary risk in vehicle software stacks. BOM refs: SBOM: pp. 9, 12, 95-98, 120, 122, 125-126, 128, 136, 153, 164, 166, 169, 185, 189, 197 · HBOM: pp. 9, 12, 75-77, 120, 122, 125-126, 128, 135-136, 153, 164, 166, 169, 183, 188, 197

References vulnerability database for assessing software provenance and foreign adversary risk in connected vehicle software stacks

BIS

Jan 2025

Telecommunications Security Code of Practice

UK

telecom

implicit

explicit

https://www.gov.uk/government/publications/telecommunications-security-code-of-practice

April 3, 2026

Not specified (incident reporting to Ofcom)

UK government code of practice for public telecoms providers, issued by the Department for Digital, Culture, Media and Sport. Sets tiered security requirements across network architecture, software supply chain, monitoring, and incident reporting. Script analysis found references to software components, vulnerability disclosure, open source components, and third party software. Ofcom is the enforcement authority. Does not name SBOM but the supply chain security and software integrity requirements are aligned with SBOM practices.

Vulnerability management, vulnerability disclosure, actively exploited vulnerability handling, security updates and patches throughout product lifecycle, penetration testing, security monitoring

UK Government/Ofcom

Dec 2022

EN 303 645 v3.1.3 — Cyber Security for Consumer IoT (UK PSTI Act baseline)

UK

general

implicit

explicit

https://www.etsi.org/deliver/etsi_en/303645_303699/303645/

April 4, 2026

Defined support period disclosure required

Updated version of global IoT security standard underpinning UK PSTI Act (in force 29 Apr 2024). 13 provisions including vulnerability disclosure, software updates, and minimised attack surfaces. Does not name SBOM but Provision 5.3 requires manufacturers to keep all software components updated and to publish a defined support period. Component tracking and software update mechanisms implicitly require software component visibility.

Vulnerability disclosure policy mandatory (Provision 5.2). Software updates throughout defined support period (Provision 5.3). Security update mechanisms required (Provision 11). Manufacturers must act on vulnerabilities in a timely manner and make updates available. Defined support period must be published and communicated to consumers.

ETSI

Vulnerability Disclosure Toolkit v2

UK

general

implicit

explicit

https://www.ncsc.gov.uk/information/vulnerability-disclosure-toolkit

April 4, 2026

Respond promptly (no specific timeline)

NCSC toolkit for vulnerability disclosure processes. Covers communication channels, disclosure policy, and security.txt (RFC 9116). SBOM adjacent practice mandated by Software Security Code Principle 3.2. References ETSI EN 303 645 and PSTI Act.

Dedicated vulnerability reporting channel, disclosure policy, security.txt (RFC 9116), validation and triage, public acknowledgement

NCSC

Nov 2024

SBOMs and the Importance of Inventory

UK

general

explicit

explicit

https://www.ncsc.gov.uk/blog-post/sboms-and-the-importance-of-inventory

April 4, 2026

N/A (guidance)

NCSC guidance entirely focused on SBOM. Covers generation, signing, dynamic updates, developer considerations, end user utility, and limitations. Notes SBOMs should be cryptographically signed and paired with vulnerability scanners. References US EO 14028 and EU CRA.

SBOM paired with vulnerability scanners, regular vulnerability checking of components, supply chain vulnerability monitoring

NCSC

Sep 2024

Government Response on Code of Practice for Software Vendors (CP 1281)

UK

general

explicit

explicit

https://www.gov.uk/government/consultations/code-of-practice-for-software-vendors

April 4, 2026

Not specified (policy direction)

Explicitly discusses SBOM. 87% of respondents supported technical guidance on SBOMs, 82% supported a secure central database of SBOMs. Government committed to publishing SBOM content with NCSC. Covers vulnerability disclosure, supply chain accountability, and procurement standardization.

Vulnerability testing and reporting, incident risk management communication, regular vulnerability testing, planned certification scheme

DSIT

Mar 2025

Software Security Code of Practice — 14 Voluntary Principles

UK

general

explicit

explicit

https://www.gov.uk/government/publications/code-of-practice-for-software-vendors

April 4, 2026

Timely (no specific hours/days mandated)

Principle 1.2 explicitly requires component inventory "such as a software bill of materials (SBOM)." Vendors must share inventory with customers. Also covers vulnerability disclosure (3.2), vulnerability management (3.3), and customer communication. Complementary to US SSDF and EU CRA.

Vulnerability disclosure process (3.2), proactive vulnerability detection and management (3.3), report vulnerabilities to relevant parties (3.4), timely security updates (3.5), incident notification (4.3)

DSIT

May 2025

Technical Guidelines on SBOM, QBOM, CBOM, AIBOM and HBOM v2.0

India

general

explicit

explicit

https://www.cert-in.org.in/

April 3, 2026

N/A

Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics and Information Technology. Comprehensive technical guidelines covering SBOM, Quantum BOM (QBOM), Cryptographic BOM (CBOM), AI BOM (AIBOM), and Hardware BOM (HBOM). Covers SBOM levels, classification, preparation, vulnerability tracking, distribution, and best practices. BOM refs: SBOM, Software Bill of Materials, Bill of Materials found

Comprehensive BOM guidelines covering SBOM vulnerability tracking, distribution, and best practices. Covers vulnerability identification through component visibility across SBOM, QBOM, CBOM, AIBOM, and HBOM

CERT-In

Jul 2025

Cyber Security Framework in Banks (RBI/2015-16/418)

India

financial

explicit

explicit

https://rbi.org.in/Scripts/NotificationUser.aspx?Id=10435

April 3, 2026

Not specified (2016 doc)

Reserve Bank of India circular mandating cybersecurity preparedness for all scheduled commercial banks (excluding Regional Rural Banks). RBI now mandates Regulated Entities to adopt CERT-In SBOM guidelines for enhanced transparency, security, and supply chain risk management. REs must generate, maintain, and update SBOMs for all software components including legacy systems, integrate SBOM requirements into vendor contracts, maintain CBOM for quantum safe preparedness, and conduct regular audits to verify SBOM accuracy. For 2026 compliance, regulators are moving toward a unified approach including SBOM, CBOM (cryptography), and AIBOM (AI models). BOM refs: SBOM via CERT-In mandate

Mandates SOC setup, continuous surveillance, penetration testing at reasonable intervals, vulnerability assessment, patch management, zero day threat monitoring, incident reporting to RBI/CERT-In

RBI

Jun 2016

Cybersecurity and Cyber Resilience Framework (CSCRF) — Main Circular

India

financial

explicit

explicit

https://www.sebi.gov.in/legal/circulars/aug-2024/cybersecurity-and-cyber-resilience-framework-cscrf-for-sebi-regulated-entities-res-_85964.html

April 3, 2026

6 hours to SEBI for incidents

The primary CSCRF circular establishing cybersecurity and cyber resilience requirements for all SEBI Regulated Entities. Follows a graded approach with five categories of REs. Compliance deadline: Jan 2025 for existing REs, Apr 2025 for new REs. Script analysis confirmed explicit SBOM, Software Bill of Materials, and Bill of Materials references, plus software component terms. Includes SBOM requirements as part of software supply chain security, asset inventory, and vulnerability management obligations. The FAQ document above provides clarifications on the SBOM provisions. BOM refs: SBOM, Software Bill of Materials, Bill of Materials found

Vulnerability management program, patch management, zero day response, 24 hour incident reporting framework, annual penetration testing, security monitoring

SEBI

Aug 2024

Cybersecurity and Cyber Resilience Framework (CSCRF) — FAQs

India

financial

explicit

explicit

https://www.sebi.gov.in/sebi_data/faqfiles/jun-2025/1749647139924.pdf

April 3, 2026

See main circular

Section 3.7 directly addresses SBOM requirements. Mandates SBOM for SEBI Regulated Entities as part of software supply chain security and asset inventory obligations. BOM refs: SBOM: pp. 1, 3, 13

Clarifies patch management obligations, penetration testing requirements for SEBI Regulated Entities

SEBI

Jun 2025

O-RAN Security Protocols (TS 104 107 v9.0.0)

Global

telecom

implicit

implicit

https://specifications.o-ran.org/specifications

April 3, 2026

N/A

Protocol specification document covering SSH, TLS 1.2/1.3, IPsec, DTLS, OAuth 2.0, CMPv2, SFTP, and certificate management for O-RAN interfaces. No traditional SBOM reference, but the cryptographic protocol and cipher suite specifications constitute the input data for a Cryptographic Bill of Materials (CBOM). CBOM — defined alongside SBOM in CERT-In Technical Guidelines v2.0 — catalogs algorithms, key lengths, certificate profiles, and protocol versions to enable crypto-agility and post-quantum migration. TS 104 107 is effectively the cryptographic inventory source for O-RAN deployments. Substantive SBOM/software component requirements appear in companion spec TS 104 104.

Specifies security protocol suites (SSHv2, TLS 1.2/1.3, IPsec, DTLS) forming part of O-RAN's defense-in-depth. The only explicit vulnerability reference is the standard ETSI CVD boilerplate footer. Substantive vulnerability management requirements are in TS 104 104. Implicit classification reflects the security protocol context; the document itself does not contain independent VM mandates.

ETSI/O-RAN Alliance

May 2025

O-RAN Threat Modeling and Risk Assessment (TR 104 106 v3.0.0)

Global

telecom

implicit

implicit

https://specifications.o-ran.org/specifications

April 3, 2026

N/A

Threat model covering open source code threats (7.4.3), application lifecycle threats (7.4.1.11), security principles for open source component risk management (SP-OPNS 8.1.9) and continuous vulnerability handling (SP-SLC 8.1.12). Risk assessment framework with severity and likelihood ratings. Does not name SBOM directly but threat analysis drives the SBOM requirements in TS 104 104.

Threat model with vulnerability analysis across O-RAN components, open source threats (7.4.3), application lifecycle threats (7.4.1.11), security principles for vulnerability handling (SP-SLC 8.1.12), risk assessment methodology

ETSI/O-RAN Alliance

Jun 2025

O-RAN Security Test Specifications (TS 104 105 v7.0.0)

Global

telecom

explicit

explicit

https://specifications.o-ran.org/specifications

April 3, 2026

Not specified

Extensive SBOM test specifications in section 9.4 covering SBOM signature, data fields, format, depth, completeness check, version verification, vulnerability cross check, delivery, vulnerabilities field, and OSC components. Also covers open source software component analysis (9.2), binary static analysis (9.3), software image signing (9.5), and system vulnerability scanning (8.2).

System vulnerability scanning test cases, SBOM vulnerability cross check, open source component analysis, binary static analysis, software image signing verification

ETSI/O-RAN Alliance

Jun 2025

O-RAN Security Requirements and Controls (TS 104 104 v9.1.0)

Global

telecom

explicit

explicit

https://specifications.o-ran.org/specifications

April 3, 2026

Not specified

Dedicated section 5.3.1 on Software Bill of Materials. Mandates SBOM for every O-RAN software delivery following NTIA guidance. Covers security requirements per O-RAN interface and component, software supply chain security, secure update, package protection, and application lifecycle management.

Security requirements per O-RAN interface, SBOM mandated for every software delivery, secure update, software package protection, application lifecycle management, vulnerability scanning

ETSI/O-RAN Alliance

Jun 2025

Delegated Regulation 2022/30 — RED Cybersecurity Requirements

EU

telecom

implicit

implicit

https://eur-lex.europa.eu/eli/reg_del/2022/30/oj

April 3, 2026

N/A

Activates RED cybersecurity requirements for internet-connected radio equipment under Art. 3(3)(d)(e)(f). Mandates network protection, data privacy, and fraud prevention. Compliance practically requires SBOM to demonstrate software component visibility and vulnerability management. EN 18031 harmonised standards (implementing these requirements) include GEC-1 requiring software/hardware component lists. Being subsumed by CRA effective Dec 2027. Application delayed to Aug 2025 (was originally Aug 2024).

Cybersecurity requirements activated by this regulation implicitly require vulnerability awareness and management of software components. EN 18031-1 GEC-1 (implementing standard) mandates continuous vulnerability monitoring and identification of publicly known exploitable vulnerabilities. No specific disclosure timelines in the delegated regulation itself.

European Commission

Jan 2022

Radio Equipment Directive (RED) 2014/53/EU

EU

telecom

none

none

https://eur-lex.europa.eu/eli/dir/2014/53/oj

April 3, 2026

N/A

Base directive (2014) focused on radio spectrum, EMC, and market access. Article 3(3)(d)(e)(f) lay the hooks for cybersecurity, privacy, and fraud prevention but had no content until activated by Delegated Regulation (EU) 2022/30 (see separate entry). EN 18031 harmonised standards (published 2024) provide substantive SBOM and vulnerability management requirements. The RED text itself contains no cybersecurity, SBOM, or software component transparency content.

Base directive with no vulnerability management content. Cybersecurity activation and substantive VM requirements flow entirely through the delegated regulation (2022/30) and EN 18031 harmonised standards. See separate entries for those documents.

European Parliament and Council

Apr 2014

IEC 81001-5-1 Interpretation Sheet 1 (ISH1:2025)

Global

medical

explicit

explicit

https://webstore.iec.ch/en/publication/108664

April 4, 2026

Not specified

interpretation sheet published December 2025 clarifying IEC 81001-5-1. Key clarifications: (1) Health software is always part of a networked, socio technical health IT system, meaning security evaluations must account for component interactions, not isolated items. This reinforces the need for complete component visibility. (2) Transitional software applies to entire products developed before the standard existed and is not a fourth classification alongside Maintained/Supported/Required. (3) Software item categories are nested but not hierarchical for risk profiles. (4) Manufacturers may downgrade categories over a product's lifetime (e.g. Maintained to Supported) but must document the risk transfer with clearly defined accompanying documents. (5) All software items regardless of category must have risks identified, updates communicated, and integrity checks performed. BOM refs: Reinforces component interaction analysis and transparency requirements that depend on SBOM

Clarifies security evaluations cannot be limited to isolated software components, must account for interactions. Strengthens risk transfer documentation. Defines transitional software classification. Reinforces full component transparency requirement.

IEC

Dec 2025

IEC 81001-5-1 — Health Software Security: Product Life Cycle

Global

medical

explicit

explicit

https://webstore.iec.ch/en/publication/34263

April 3, 2026

Not specified

International standard for health software security lifecycle. Team NB and IGNB (German Association of Notified Bodies) have endorsed it as "state of the art" for EU MDR cybersecurity compliance since 2022; formal harmonization postponed to 2028. Uses its own software item classification (Maintained, Supported, Required) rather than IEC 62304's SOUP/OTSS terminology. Mandates identifying and assessing risks for all software items including third party components, tracking their updates, and performing post production security surveillance. The standard itself describes SBOM as "a documentation that tracks all incorporated software" and distinguishes Maintained/Supported/Required status for components within it. While it does not prescribe specific SBOM fields or formats, the component tracking, vulnerability management, and configuration management requirements cannot be met without maintaining what is effectively an SBOM. The FDA 2025 premarket cybersecurity guidance lists IEC 81001-5-1 as one framework manufacturers may use, though the FDA goes further by mandating NTIA minimum elements, machine readable formats (SPDX/CycloneDX), and end of support dates per component. TUV SUD provides compliance guidance that includes SBOM as part of the documentation set. BOM refs: SBOM described in standard text; de facto requirement through component tracking and vulnerability management clauses

Mandates comprehensive software component risk assessment including all SOUP/OTSS. Requires vulnerability management, security update processes, and incident response throughout product lifecycle. Component tracking constitutes de facto SBOM requirement.

IEC

Dec 2021

Medical Device Regulation (MDR) 2017/745

EU

medical

implicit

explicit

https://eur-lex.europa.eu/eli/reg/2017/745/oj

April 3, 2026

24 hours for serious incidents

MDR text (2017) does not name SBOM. However, GSPR 17.4 (Annex I) requires manufacturers to set out minimum requirements for hardware, IT networks, and security measures for software. MDCG 2019-16 (implementing guidance) explicitly states the Software Bill of Materials or equivalent SOUP list must be kept current and feed into vulnerability monitoring. IEC 81001-5-1, now recognised by notified bodies as the harmonised standard for MDR cybersecurity, explicitly mandates SBOM. Implicit classification reflects the established regulatory expectation even though the MDR text itself predates SBOM terminology.

GSPR 17.2 (Annex I) requires post-market surveillance of software, including monitoring for newly discovered vulnerabilities in SOUP/OTS components. Article 83 mandates post-market surveillance systems. MDCG 2019-16 specifies infield vulnerability monitoring and patch delivery. Serious incident reporting within 24 hours. No specific CVD disclosure timelines in MDR text; MDCG 2019-16 provides the operational framework.

European Parliament and Council

Apr 2017

Circular 2023/1 — Operational Risks and Resilience: Banks

Switzerland

financial

none

explicit

https://www.finma.ch/en/~/media/finma/dokumente/dokumentencenter/myfinma/rundschreiben/finma-rs-2023-01-20221207.pdf

April 3, 2026

24h for critical incidents, 72h for significant incidents

Swiss Financial Market Supervisory Authority circular on operational risk management for banks. Requires institutions to maintain real-time inventories of ICT assets including hardware and software (margin 53), but this is an operational IT asset management obligation (CMDB-style), not a structured software component transparency (SBOM) requirement. No reference to CycloneDX, SPDX, software composition analysis, or supply chain software transparency. Compliance deadline for inventory requirements was January 2025.

Explicit vulnerability management obligations: penetration testing mandated (margin 53, footnote 16 references targeted audit and exploitation of software vulnerabilities), vulnerability scanning required (footnote 15). Incident lifecycle management for significant ICT incidents (margins 57-62). Monitoring of inventoried ICT assets for cyber risks required. Incident reporting to FINMA within 24h (critical) or 72h (significant).

FINMA

Dec 2022

NIS 2 Directive 2022/2555 — High Common Level of Cybersecurity

EU

general

implicit

explicit

https://eur-lex.europa.eu/eli/dir/2022/2555/oj

April 3, 2026

24h early warning, 72h notification, 1 month final report

Replaces NIS 1 (2016/1148). Art. 21(2)(d) mandates supply chain security including security related aspects of relationships between each entity and its direct suppliers or service providers. Art. 22 establishes EU level coordinated security risk assessments of critical supply chains. Art. 7/12 create the coordinated vulnerability disclosure framework. Art. 12(2) establishes the ENISA European vulnerability database. Covers 18 sectors (energy, transport, banking, health, digital infrastructure, ICT service management, public administration, space, etc.). Member State transposition deadline was 17 Oct 2024. Does not name SBOM explicitly but supply chain security, vulnerability disclosure, and software component visibility are core use cases throughout.

Coordinated vulnerability disclosure framework, European vulnerability database (ENISA), mandatory incident reporting for essential/important entities, penetration testing. See Quick Reference above.

European Parliament and Council

Dec 2022

Implementing Regulation 2025/2392 — CRA Product Categories

EU

general

implicit

implicit

https://eur-lex.europa.eu/eli/reg_impl/2025/2392/oj

April 3, 2026

N/A

Defines the technical descriptions for product categories listed in CRA Annexes III (important, Class I and II) and IV (critical). Covers operating systems, hypervisors, firewalls, VPNs, intrusion detection systems, routers, microcontrollers, and industrial automation systems. Product categorization determines SBOM obligations: Class II and critical products face third-party conformity assessment which will scrutinize SBOM completeness and quality.

Product categorization determines conformity assessment level, indirectly affecting vulnerability management obligations. Higher-category products (Class II, critical) face stricter vulnerability handling requirements and third-party assessment of their vulnerability management processes.

European Commission

Nov 2025

Regulation 2024/1183 — European Digital Identity Framework (eIDAS 2.0)

EU

general

implicit

explicit

https://eur-lex.europa.eu/eli/reg/2024/1183/oj

April 3, 2026

24 hours for trust service security breaches

Establishes the European Digital Identity Framework, mandating that every Member State offer at least one EUDI Wallet to citizens and residents by December 2026. Covers electronic identification, trust services, electronic signatures, seals, timestamps, registered delivery, and website authentication. Script analysis found software component references. Does not name SBOM directly, but the wallet certification requirements, trust service provider audits, and security evaluation of digital identity components create implicit dependencies on software supply chain transparency. Four implementing regulations on wallet technical standards were adopted in late 2025.

Trust service providers must notify supervisory body of security breaches within 24 hours. Wallet certification includes security evaluation.

European Parliament and Council

Apr 2024

Implementing Regulation 2024/482 — EUCC Cybersecurity Certification Scheme

EU

general

implicit

explicit

https://eur-lex.europa.eu/eli/reg_impl/2024/482/oj

April 3, 2026

N/A

Lays down rules for applying the EU Cybersecurity Act (Regulation 2019/881) to establish the EUCC scheme for ICT products. Defines two assurance levels: substantial (AVA_VAN 1-2) and high (AVA_VAN 3-5). Requires evaluation of software components and dependencies as part of certification. Software composition analysis is implicit in the vulnerability assessment methodology. No direct SBOM mandate but component-level evaluation creates implicit need for software inventory.

Vulnerability management as part of certification maintenance. Vulnerability assessment levels (AVA_VAN) define depth of vulnerability analysis required. Certified products must maintain security posture post-certification including vulnerability disclosure and patch management. Vulnerability database monitoring referenced.

European Commission

Jan 2024

TR 104 034 — Cyber Security SBOM Compendium v1.1.1

EU

general

explicit

explicit

https://www.etsi.org/deliver/etsi_tr/104000_104099/104034/01.01.01_60/tr_104034v010101p.pdf

April 3, 2026

N/A

Dedicated SBOM technical report by ETSI. Covers SBOM formats, use cases, tooling, CycloneDX and SPDX schema details, VEX integration, and regulatory mapping including EU CRA and ETSI EN 303 645. BOM refs: SBOM: pp. 1, 3-20 · AIBOM: p. 9 · MLBOM: pp. 10, 15 · CBOM: pp. 9, 15, 17 · HBOM: pp. 10, 15, 17

Vulnerability management via SBOM, coordinated disclosure, vulnerability database, vulnerability reporting

ETSI

May 2025

CRA Briefing

EU

general

explicit

explicit

https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2022)739259

April 3, 2026

Summarizes CRA 24h/72h timelines

Parliamentary briefing on Regulation (EU) 2024/2847. Explicitly mentions SBOM as one of the CRA's key transparency tools alongside vulnerability disclosure requirements. BOM refs: SBOM: p. 12

Parliamentary summary of CRA vulnerability handling, actively exploited vulnerability notification, security update obligations, penetration testing

European Parliament Research Service

Dec 2024

Threat Landscape 2024

EU

general

implicit

explicit

https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024

April 3, 2026

N/A (threat report)

Annual EU threat intelligence report. References software supply chain attacks and the need for software component visibility. Does not explicitly name SBOM but the attack patterns described are the core SBOM use case.

Documents vulnerability exploitation trends, zero day attacks, vulnerability disclosure practices, patch management recommendations, vulnerability scanning

ENISA

Sep 2024

SBOM Landscape Analysis: Towards an Implementation Guide v1.20

EU

general

explicit

explicit

https://www.enisa.europa.eu/publications/software-bill-of-materials-landscape-analysis

April 3, 2026

References CRA 24h timeline

Entirely focused on SBOM. Covers SBOM formats (CycloneDX, SPDX), tooling landscape, component inventory, software transparency, and implementation guidance aligned with EU CRA. BOM refs: SBOM: pp. 1-83 · MLBOM: p. 16

Vulnerability monitoring, vulnerability management via SBOM, vulnerability database integration, vulnerability scanning, patch management, zero day handling

ENISA

Dec 2025

CRA Overview Presentation (DG CONNECT)

EU

general

explicit

none

https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act

April 3, 2026

N/A

DG CONNECT legislative overview presentation (9 slides) summarizing the CRA proposal. Slide 7 explicitly covers SBOM in the CRA: manufacturers must draw up an SBOM in a commonly used format covering at minimum top-level dependencies; no requirement to make the SBOM publicly available; SBOM included in technical documentation and provided to market surveillance authorities on request; Commission empowered to specify format and elements referencing international standards.

Legislative briefing deck with no specific vulnerability management content. VM requirements are covered extensively in the full CRA text (see separate entry for Regulation 2024/2847).

European Commission

Cyber Resilience Act (CRA) — Official FAQs v1.0

EU

general

explicit

explicit

https://digital-strategy.ec.europa.eu/en/faqs/cyber-resilience-act-questions-and-answers

April 3, 2026

Clarifies 24h/72h/14d timelines

European Commission implementation FAQs for Regulation (EU) 2024/2847. Explicitly addresses SBOM obligations, scope, and compliance timelines under the CRA. BOM refs: SBOM: p. 47

Vulnerability handling obligations, coordinated disclosure, actively exploited vulnerability notification, zero day scenarios, security update delivery, penetration testing

European Commission

Dec 2025

TR-03183 Part 3: Vulnerability Reports and Notifications v1.0.0

Germany

general

implicit

explicit

https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03183/TR-03183_node.html

April 3, 2026

Aligned with CRA Art. 14

Covers vulnerability disclosure and notification requirements. References software component-level vulnerability tracking and VEX-adjacent concepts without naming SBOM directly. SBOM is the natural upstream dependency.

Dedicated to vulnerability reporting. Covers coordinated disclosure, actively exploited vulnerability notification, vulnerability report format and content, vulnerability database integration

BSI

Aug 2025

TR-03183 Part 2: Software Bill of Materials (SBOM) v2.1.0

Germany

general

explicit

explicit

https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03183/TR-03183_node.html

April 3, 2026

N/A

Updated version. Adds logical/identified component definitions, updates CycloneDX minimum to 1.6, SPDX minimum to 3.0.1. Supersedes v2.0.0. BOM refs: SBOM: pp. 1, 3-5, 7-22, 29, 33-37

Updated SBOM standard supporting vulnerability handling and vulnerability database integration

BSI

Aug 2025

TR-03183 Part 1: Cyber Resilience Requirements — General Requirements

Germany

general

explicit

explicit

https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03183/TR-03183_node.html

April 3, 2026

24h/72h (aligned with CRA)

Living document aligned with EU CRA. Explicitly references SBOM as a required artifact for manufacturers of products with digital elements. Cross-references Part 2 for SBOM specifics. BOM refs: SBOM: pp. 17, 25

Vulnerability handling processes, coordinated disclosure, actively exploited vulnerability reporting, security update delivery, incident notification, penetration testing

BSI

Sep 2025

Cyber Resilience Act (CRA) — Regulation 2024/2847

EU

general

explicit

explicit

https://eur-lex.europa.eu/eli/reg/2024/2847/oj

April 3, 2026

24h / 72h / 14d (vuln); 24h / 72h / 1mo (incident)

The primary CRA legal text. Entered into force 10 December 2024; full application from 11 December 2027. Explicitly mandates SBOM and software transparency requirements in Annex I. Sets out mandatory cybersecurity requirements for all products with digital elements placed on the EU market. BOM refs: SBOM: pp. 5, 18, 25, 31, 38, 68, 70, 75

Full vulnerability lifecycle: actively exploited vulnerability notification via ENISA platform, coordinated disclosure, security updates for entire support period, vulnerability handling with SBOM, European vulnerability database. See Quick Reference above.

European Parliament and Council

Oct 2024

GB 44495-2024 — Technical Requirements for Vehicle Cybersecurity

China

automotive

implicit

implicit

https://www.sac.gov.cn/

April 3, 2026

Not specified

China's national mandatory standard for vehicle cybersecurity. Issued by SAMR and SAC. Defines requirements for vehicle cybersecurity management systems, technical cybersecurity measures, risk assessment, and component-level security testing. Software supply chain management and component verification requirements create implicit SBOM needs. Aligned with WP.29 UN R155/R156 cybersecurity framework.

Covers software update security and component-level security testing. Requires cybersecurity management system including threat monitoring and incident response capabilities. Based on WP.29 framework which includes continuous vulnerability monitoring. No specific public disclosure timelines defined in the standard.

SAC/SAMR

Aug 2024

Pre-market Requirements for Medical Device Cybersecurity

Canada

medical

explicit

explicit

https://www.canada.ca/en/health-canada/services/drugs-health-products/medical-devices/application-information/guidance-documents/cybersecurity.html

April 4, 2026

Not specified (requires "timely" patching plan)

Explicitly defines "cybersecurity bill of materials (BOM)" on p.8 as a list of commercial, open source, and OTS software and hardware components that are or could become susceptible to vulnerabilities. Section 2.3.1 (p.16) requires the BOM to list all third party or open source software components with version and build as part of Class III/IV device licence applications. Applies to all device classes (I to IV) under the Medical Devices Regulations. Section 2.2 (p.15) requires post-market vigilance plan including patching, vulnerability disclosure per coordinated process, and participation in ISAOs/ISACs. References NIST CSF, ISO 14971, AAMI TIR57:2016, IEC 62304, UL 2900-1:2017 and UL 2900-2-1:2018. Appendix A maps NIST CSF five functions (Identify, Protect, Detect, Respond, Recover) to medical device design controls.

Section 2.2: post-market vigilance, patching, vulnerability disclosure, ISAO/ISAC participation. Section 2.1.3: V&V including NVD vulnerability testing, fuzz testing, penetration testing, static analysis. References AAMI TIR57, UL 2900, IEC 62304, ISO 14971, NIST CSF.

Health Canada

Jun 2019

Critical Cyber Systems Protection Act (Bill C-8)

Canada

general

implicit

explicit

https://www.parl.ca/legisinfo/en/bill/45-1/c-8

April 3, 2026

72 hours for cyber security incidents

Contains dedicated "Mitigation of Supply-chain and Third-party Risks" provisions (Sections 15-16). Section 9(1)(a) requires cyber security programs to identify and manage risks "associated with supply chains and the use of third-party products and services." Section 15.2(j)(k) enables mandatory vulnerability assessments on telecom networks. No direct SBOM mention, but supply chain risk management, third-party product controls, and vulnerability mitigation are core implicit SBOM use cases. Nearly identical to C-26 with minor judicial review transparency amendments.

Mandatory incident reporting to CSE within 72 hours for designated operators of critical cyber systems

Parliament of Canada

Jun 2025

Information Security Manual: Guidelines for Software Development

Australia

general

implicit

explicit

https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/ism

April 3, 2026

Not specified

Official Australian government security guidelines for software development. References secure software development practices, third party component management, and supply chain security. ACSC has separately endorsed SBOM adoption through the Shared Vision document but the ISM does not mandate SBOM by name.

Vulnerability disclosure process, coordinated vulnerability handling, security update delivery

ACSC

Jun 2025

Security of Critical Infrastructure Amendment (Enhanced Response and Prevention) Act 2024

Australia

general

implicit

explicit

https://www.legislation.gov.au/C2024A00105/latest/text

April 3, 2026

72 hours for ransomware payment reporting

Part of Australia's Cyber Security Legislative Package 2024. Establishes limited use obligations for incident reporting, smart device security standards, ransomware payment reporting, and a Cyber Incident Review Board. Amends the SOCI Act 2018 to strengthen obligations for critical infrastructure entities. Supply chain security provisions create implicit SBOM requirements for visibility into software components used in critical infrastructure.

Mandatory ransomware payment reporting within 72 hours. Establishes incident reporting framework for critical infrastructure entities. Cyber Incident Review Board for post-incident analysis. Security standards for smart devices include vulnerability management obligations.

Parliament of Australia

2024

Comprehensive Plan for Information Security Across Ministries

South Korea

general

explicit

implicit

https://www.msit.go.kr/eng/bbs/view.do?sCode=eng&mId=4&mPid=2&pageIndex=1&bbsSeqNo=42&nttSeqNo=989

April 3, 2026

N/A

South Korean government plan mandating SBOMs for IT systems and products across public, financial, telecommunications, and platform operator sectors, with institutionalization targeted by 2027. Requires real-time vulnerability inspection across software components and supply chain traceability. Announced October 2025 following SK Telecom and Lotte Card breaches. Coordinated across MSIT, KISA, and partner agencies.

Plan explicitly requires real-time vulnerability inspection across software components as part of the SBOM framework. Includes supply chain traceability and response capabilities. Vulnerability security assessments mandated for approximately 1,600 key IT systems across public institutions, financial sector, and telecom operators. No specific CVD disclosure timelines; focus is on continuous monitoring and inspection capability.

MSIT/KISA

Oct 2025

JC-STAR IoT Product Security Labeling Scheme

Japan

general

implicit

explicit

https://www.ipa.go.jp/en/security/jc-star/index.html

April 3, 2026

Not specified

Japan's IoT security conformity assessment and labeling scheme. STAR-1 baseline began May 2025; STAR-3/4 for critical national infrastructure finalized late 2025. Requires security evaluation of product components and supply chain. SBOM is the natural upstream mechanism for component visibility though not named in the scheme itself. Will be required in government procurement.

Requires vulnerability disclosure process for IoT products in the labeling scheme

METI/IPA

Mar 2025

Guide on Introduction of SBOM for Software Management

Japan

general

explicit

explicit

https://www.meti.go.jp/english/press/2024/0829_002.html

April 3, 2026

Not specified

Japan's primary SBOM implementation guide. Covers SBOM creation, management, and use for both software suppliers and procurers. Addresses SBOM formats (CycloneDX, SPDX), depth requirements, and integration into vulnerability management workflows. Ver 2.0 expands scope to include software procurement side.

Comprehensive vulnerability management lifecycle using SBOM. Covers vulnerability monitoring, vulnerability database querying (NVD), coordinated disclosure, zero day handling, incident response

METI

Aug 2024