Publishing SBOMs of webservers? #1415
-
Hi everyone, I saw that DT is now providing the SBOM at /.well-known/sbom and am surprised about that. We mainly use DT/SBOMs to detect vulnerabilities in our dependencies and as such, the SBOM itself (and the resulting vulnerability information) is nothing I would like to be exposed for any of my servers/application that are not "distributed" to other parties. I do understand that, if you ship an application to a customer, it might be a valid use case to "provide an SBOM to the customer", so that they can track it themselves. Could we maybe "protect" this information with the normal authentication layer, or is my take on publishing SBOMs of (potentially vulnerable) applications wrong? See #1363 |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
@DrakezulsMinimalism I think you're describing a possible concern that SBOM is a roadmap to the attacker. Take a look at https://www.ntia.gov/files/ntia/publications/sbom_faq_-_20201116.pdf. Publishing the SBOM to The Dependency-Track project has published its SBOM for every release since v3.8. All SBOMs are available publicly from GitHub releases. https://github.com/DependencyTrack/dependency-track/releases. Source code is also publicly available so anyone could generate their own SBOM if they did not want to trust the accuracy of the ones provided. |
Beta Was this translation helpful? Give feedback.
-
Hi @stevespringett, I'm more concerned about the use of an SBOM provide in ".well-known" to automatically scan servers/applications for an in-depth report without authentication. I'd rather have Dependency-Track track its own SBOM automatically? [maybe, as an additional idea] Even after reading the section "roadmap to the attacker" and agreeing with the justifications, the idea of a (public) webserver exposing so much information feels strange, especially since Dependency-Track centralizes a lot of potentially critical information itself. Thanks! |
Beta Was this translation helpful? Give feedback.
@DrakezulsMinimalism I think you're describing a possible concern that SBOM is a roadmap to the attacker. Take a look at https://www.ntia.gov/files/ntia/publications/sbom_faq_-_20201116.pdf.
Publishing the SBOM to
/.well-known/sbom
helps consumers (organizations that use Dependency-Track), especially those organizations with multiple instances and versions of Dependency-Track deployed, as it provides a common URL in which to get the SBOM for their specific versions. This information is extremely useful to defenders.The Dependency-Track project has published its SBOM for every release since v3.8. All SBOMs are available publicly from GitHub releases. https://github.com/DependencyTrack/dep…