Date   

Minutes from June 1 SPDX General Meeting

Rose Judge
 

Hello SPDX Community,

 

Thanks to the 42 of you that were able to join us for the June General Meeting last week. Another big thanks to Mike and Brandon for their presentation on GUAC. The slides from their presentation are attached for anyone who was unable to join.

 

The minutes for the June General Meeting are also available for review. Not all attendees were captured in the Attendee list, so if you attended the meeting and are missing from that list, please let me know. We’ll approve these meeting minutes at the beginning of our next call on July 13th (Moved a week to accommodate the US July 4th Holiday.)

 

Have a great week!


Re: Interpretation of Errors and Exceptions from SPDX Online Tools #spdx

Gary O'Neall
 

Hi Arturo,

 

The spreadsheet format supported by the online tools follows a specific format that includes all the fields as columns supporting the entire spec.  It wasn’t intended to just support the LITE format, although that isn’t a bad idea.  We could add an issue in the SPDX Spreadsheet Store to support a LITE version and see if we find any volunteers to implement it.  I’ll be pretty focused on upgrading the libraries to 3.0 for the next few weeks, so it may be a while before I can look into it.

 

Although the columns and sheets are required, you don’t need to have any values for any of the columns not in the LITE profile.

 

What I would suggest is starting with the full spreadsheet and just fill in the columns which are relevant.

 

You can take the SPDX example XLS document and remove the data for as starting point.

 

Using the Python API’s is also a good option for generating the output if that is easier.

 

You can also use the Tag/Value, JSON or YAML formats and convert those to RDF/XML – YAML is a reasonably human readable / writable option.

 

Regards,

Gary

 

From: spdx@... <spdx@...> On Behalf Of arturrzgz@...
Sent: Friday, June 2, 2023 8:34 AM
To: spdx@...
Subject: Re: [spdx] Interpretation of Errors and Exceptions from SPDX Online Tools #spdx

 

Hello Gary,

Sorry for late response. Thanks for your input, however let me first tell you a bit more of what I'm trying to achieve. 

Annex G of the SPDX v2.2.2 spec (SPDX Lite), there is a subset of mandatory fields of the Document Creation and Package Information sections to create the document and also "keep compatibility with SPDX tools". 

Even though I have ensured that these fields are introduced in my SPDX XLS Document, the validation tool throws these error messages:

Analysis exception processing SPDX file: Column <Name_of_column> missing for SPDX <Clause> worksheet
As I keep adding the missing columns in each of the worksheets the error message updates to the next missing column or worksheet missing. I'm not sure if this SPDX Lite format is supported by the tools. At the end I want to validate to be able to convert the XLS to RDF/XML.

On the other hand, I've been using the python-tools API to create my desired output format.

Let me know if it is still worth for me to report the issue, or is this expected behaviour. 

Regards, Arturo


Re: Interpretation of Errors and Exceptions from SPDX Online Tools #spdx

arturrzgz@...
 

Hello Gary,

Sorry for late response. Thanks for your input, however let me first tell you a bit more of what I'm trying to achieve. 

Annex G of the SPDX v2.2.2 spec (SPDX Lite), there is a subset of mandatory fields of the Document Creation and Package Information sections to create the document and also "keep compatibility with SPDX tools". 

Even though I have ensured that these fields are introduced in my SPDX XLS Document, the validation tool throws these error messages:

Analysis exception processing SPDX file: Column <Name_of_column> missing for SPDX <Clause> worksheet
As I keep adding the missing columns in each of the worksheets the error message updates to the next missing column or worksheet missing. I'm not sure if this SPDX Lite format is supported by the tools. At the end I want to validate to be able to convert the XLS to RDF/XML.

On the other hand, I've been using the python-tools API to create my desired output format.

Let me know if it is still worth for me to report the issue, or is this expected behaviour. 

Regards, Arturo


Re: Interpretation of Errors and Exceptions from SPDX Online Tools #spdx

Gary O'Neall
 

Greetings,

 

If you are seeing an exception type message, especially if it has a stack trace, it is likely an issue with the tool.

 

Could you submit an issue at https://github.com/spdx/spdx-online-tools/issues and include a screenshot of the error message?

 

You should get a response within a day or two.


Best,

Gary

 

From: spdx@... <spdx@...> On Behalf Of arturrzgz@...
Sent: Tuesday, May 30, 2023 3:49 PM
To: spdx@...
Subject: [spdx] Interpretation of Errors and Exceptions from SPDX Online Tools #spdx

 

I've been using the SPDX Online Tools recently to Validate and Convert. However, when an error or an exception is being thrown by the tool, understanding of the nature of the issue has not been clear to me. The problem or exception may occurr do to a bug in the tool or due to the format itself not being compliant. Either way, I haven't found a way to troubleshoot the issues with my current document in a comprehensible way. I would appreciate some direction on how can I understand this error codes and/or any reference to where these might be documented. 


Interpretation of Errors and Exceptions from SPDX Online Tools #spdx

arturrzgz@...
 

I've been using the SPDX Online Tools recently to Validate and Convert. However, when an error or an exception is being thrown by the tool, understanding of the nature of the issue has not been clear to me. The problem or exception may occurr do to a bug in the tool or due to the format itself not being compliant. Either way, I haven't found a way to troubleshoot the issues with my current document in a comprehensible way. I would appreciate some direction on how can I understand this error codes and/or any reference to where these might be documented. 


SPDX General Meeting Reminder.

Phil Odence
 

We’ve great presentations planned for Thursday and the July meeting. Note, due to the the first week of July being a big vacation week in the US, we’ll push the July meeting a week to July 13.

 

Today’s special presentation:

 

Getting directed and actionable insights from your SBOMs from GUAC

 

With the rise of the popularity of SBOMs, more and more consumers of software are asking the question of what to do with them? For most, the large amounts of data now streaming in can be overwhelming. GUAC helps to organize that data and acts as a telescope to what's important. With GUAC, organizations can ingest SBOMs and other software metadata documents from different formats and sources and query them through an assembled knowledge graph. In addition, today, there is both too much data, but also sometimes a lack of data where it matters. GUAC, as a platform, provides the ability to augment SBOM data with other data sources and threat intelligence to get a more holistic view of the supply chain.

 

Brandon Lum 

Brandon loves designing and implementing computer systems (with a focus on Security, Operating Systems, and Distributed/Parallel Systems). Brandon is a Co-chair of the CNCF Security TAG, and as a part of Google's Open Source Security Team, he works on improving the supply chain security of the Open Source ecosystem through efforts around supply chain knowledge graphs - GUAC, SBOMs, and VEX. Previously at IBM Research, Brandon worked on various security areas such as: Container content protection via encryption and image signing, identity, and kernel attack surface reduction.

 

 

Michael Lieberman

Michael Lieberman is a Chief Technology Officer at Kusari focused on technology transformation especially with regards to cloud native architectures, technologies and migrations. Most recently he has been focused on work within the software supply chain security space. He is co-chair of the CNCF Financial Services User Group, SLSA steering committee member, and recently co-lead the Secure Software Factory Reference Architecture for the Security Technical Advisory Group. Michael has also participated in multiple podcasts, panels and talks on behalf of the FSUG, the companies he’s worked for and on behalf of himself as an individual contributor in the tech community.

 

 

Meeting Time: Thurs, June 1, 8am PT / 10 am CT / 11am ET / 15:00 UTC. http://www.timeanddate.com/worldclock/converter.html


Conf call dial-in:

Join the meeting:
https://meet.jit.si/SPDXGeneralMeeting

To join by phone instead, tap this: +1.512.647.1431,,1310118349#

Looking for a different dial-in number?
See meeting dial-in numbers: 
https://meet.jit.si/static/dialInInfo.html?room=SPDXGeneralMeeting


If also dialing-in through a room phone, join without connecting to audio: 
https://meet.jit.si/SPDXGeneralMeeting#config.startSilent=true

 

Etherpad for minutes:

https://spdx.swinslow.net/p/spdx-general-minutes

 

Administrative Agenda

Attendance

Minutes Approvalhttps://github.com/spdx/meetings/blob/main/general/2023-05-04.md

 

Steering Committee Update 

 

Special Presentation

 

Technical Team Report – Kate/Gary/Others

  • Specification and Profiles
    • Overview
    • Core
    • Legal
    • Integrity
    • Defects
    • Usage and Other Emerging
  • Tooling

 

Legal Team Report – Jilayne/Steve

 

Outreach/Website Team Report – Alexios/Bob

 


Announcement from Exiger

Dick Brooks
 

Hello Everyone,

 

Consolidation of the SBOM market space continues at pace with this announcement of Ion Channel being acquired by Exiger.

https://www.linkedin.com/posts/bob-kolasky-92ab554_exiger-acquires-industry-leading-software-activity-7064238244292358145-6nAx?utm_source=share&utm_medium=member_desktop

 

This is not surprising given the US Government requirements for software suppliers and vendors to attest to implementing NIST Guidance that includes SBOM in order to sell products to the US Government.

FYI: Ion Channel is one of the SBOM Special Interest Group members that filed comments with NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

 


Reminder: Thursday SPDX General Meeting

Phil Odence
 

Meeting Time: Thurs, May 4, 8am PT / 10 am CT / 11am ET / 15:00 UTC. http://www.timeanddate.com/worldclock/converter.html


Conf call dial-in:

Join the meeting:
https://meet.jit.si/SPDXGeneralMeeting

To join by phone instead, tap this: +1.512.647.1431,,1310118349#

Looking for a different dial-in number?
See meeting dial-in numbers: 
https://meet.jit.si/static/dialInInfo.html?room=SPDXGeneralMeeting


If also dialing-in through a room phone, join without connecting to audio: 
https://meet.jit.si/SPDXGeneralMeeting#config.startSilent=true

 

Etherpad for minutes:

https://spdx.swinslow.net/p/spdx-general-minutes

 

Administrative Agenda

Attendance

Minutes Approval: https://github.com/spdx/meetings/blob/main/general/2023-04-06.md

  

Steering Committee Update – Phil

  • New marketing resource
  • Upcoming Mini-Summit

 

Technical Team Report – Kate/Gary/Others

  • Specification and Profiles
    • Overview
    • Core
    • Legal
    • Integrity
    • Defects
    • Usage and Other Emerging
  • Tooling

 

Legal Team Report – Jilayne/Steve

 

Outreach/Website Team Report – Alexios/Bob

 


Re: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

Dick Brooks
 

Thanks for your consideration, Henry.

 

John, is ITI interested in collaborating with the SMB community on this opportunity?

 

There are literally thousands of SMB’s in this space and my list of interested parties continues to grow.

Clearly, there are SMB’s with an interest in collaborating on this matter, which affects all of us.

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Henry Young <henryy@...>
Sent: Monday, May 1, 2023 9:31 AM
To: dick@...; ljeanc@...; spdx@...
Cc: scitt@...; John Miller <JMiller@...>
Subject: RE: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

 

Dick,

 

Thanks so much for reaching.  I think it is likely that BSA will provide comments to CISA, and while I suspect many of the points we make will be the same, we probably won’t be submitting as part of a multi-association effort.

 

Henry

 

 

Image removed by sender.

Henry Young

Director, Policy

BSA | The Software Alliance

P (202) 266-2522

W bsa.org

Image removed by sender.

Image removed by sender.

Image removed by sender.

Image removed by sender.

 

 

 

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 10:56 AM
To: ljeanc@...; spdx@...
Cc: scitt@...; John Miller <JMiller@...>; Henry Young <henryy@...>
Subject: RE: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

 

Thank you Jean, I have added your name to the growing list of parties that have expressed an interest in joining this collaboration.

 

FYI: I’ve also reached out to ITI and BSA to collaborate on this.

 

I see this as a unique opportunity to show that the “Big Guys” (BSA/ITI) and the little SMB’s that produce software are coming together on this very important opportunity to collaborate on an item that affects all of us.

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: SCITT <scitt-bounces@...> On Behalf Of L Jean Camp
Sent: Saturday, April 29, 2023 10:20 AM
To: spdx@...
Cc: scitt@...
Subject: Re: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

 

I am interested. Also I would like to know if anyone else has any interest in ensuring attestation standards have space to enable cryptographic agility or move towards self attesting addresses?

 

On Sat, Apr 29, 2023 at 9:34 AM Dick Brooks <dick@...> wrote:

FYI: I’m envisioning a similar process to what was used by the SBOM Special Internet Group (SBOM SIG), contained in this filing to NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 9:21 AM
To: 'scitt@...' <scitt@...>; 'spdx@...' <spdx@...>
Subject: CISA's proposed attestation form is now available and they are seeking comments

 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

--


Re: CISA's proposed attestation form is now available and they are seeking comments

Alfred Strauch
 

Dear Mr Brooks,
We are interested in attestation.
Alfred Strauch, Smart Talk Beacon
Steven CarbnoSmart Talk Beacon


Alfred Strauch
President
SmartTalk Security Inc.

Email: alfred@...

          

Confidentiality and Disclaimer: The informa tion in this transmission may be confidential and/or protected by legal professional privilege, and is intended only for the person or persons to whom it is addressed. If you are not such a person, you are warned that any disclosure, copying or dissemination of the information is unauthorized  If you have received the transmission in error, please immediately contact this Office by telephone or email, to inform us of the error and to enable arrangements to be made for the destruction of the transmission, or its return at our cost. No liability is accepted for any unauthorized use of the information contained in this transmission.
If the transmission contains advice, the advice is based on instructions in relation to, and is provided to the addressee in connection with, the matter mentioned above. Responsibility is not accepted for reliance upon it by any other person or for any other purpose.




On Sat, Apr 29, 2023 at 7:34 AM Dick Brooks <dick@...> wrote:

FYI: I’m envisioning a similar process to what was used by the SBOM Special Internet Group (SBOM SIG), contained in this filing to NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 9:21 AM
To: 'scitt@...' <scitt@...>; 'spdx@...' <spdx@...>
Subject: CISA's proposed attestation form is now available and they are seeking comments

 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 


Re: CISA's proposed attestation form is now available and they are seeking comments

Dick Brooks
 

FYI

 

I have reached out to ITI and BSA on this opportunity and am waiting to hear back.

 

This matter affects everyone working in the SBOM community that is producing software products, aiming to sell to the US Government.

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of Jean Camp
Sent: Saturday, April 29, 2023 10:20 AM
To: spdx@...
Cc: scitt@...
Subject: Re: [spdx] CISA's proposed attestation form is now available and they are seeking comments

 

I am interested. Also I would like to know if anyone else has any interest in ensuring attestation standards have space to enable cryptographic agility or move towards self attesting addresses?

 

On Sat, Apr 29, 2023 at 9:34 AM Dick Brooks <dick@...> wrote:

FYI: I’m envisioning a similar process to what was used by the SBOM Special Internet Group (SBOM SIG), contained in this filing to NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 9:21 AM
To: 'scitt@...' <scitt@...>; 'spdx@...' <spdx@...>
Subject: CISA's proposed attestation form is now available and they are seeking comments

 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

--


Re: CISA's proposed attestation form is now available and they are seeking comments

Jean Camp
 

I am interested. Also I would like to know if anyone else has any interest in ensuring attestation standards have space to enable cryptographic agility or move towards self attesting addresses?

On Sat, Apr 29, 2023 at 9:34 AM Dick Brooks <dick@...> wrote:

FYI: I’m envisioning a similar process to what was used by the SBOM Special Internet Group (SBOM SIG), contained in this filing to NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 9:21 AM
To: 'scitt@...' <scitt@...>; 'spdx@...' <spdx@...>
Subject: CISA's proposed attestation form is now available and they are seeking comments

 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 


Re: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

Dick Brooks
 

I'm seeing a good response so far.

Hoping to reach 100 small and medium businesses providing software to the US Government sign-on to this collaborative joint filing effort before the filing deadline for this CISA call for comments.

Thanks,

Dick Brooks

Active Member of the CISA Critical Manufacturing Sector,
Sector Coordinating Council – A Public-Private Partnership

Never trust software, always verify and report! ™
http://www.reliableenergyanalytics.com
Email: dick@...
Tel: +1 978-696-1788

-----Original Message-----
From: SCITT <scitt-bounces@...> On Behalf Of Michael Richardson
Sent: Sunday, April 30, 2023 1:18 PM
To: ljeanc@...; spdx@...; scitt@...
Subject: Re: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments


L Jean Camp <ljeanc@...> wrote:
> I am interested. Also I would like to know if anyone else has any interest
> in ensuring attestation standards have space to enable cryptographic
> agility or move towards self attesting addresses?

If you pick an IETF specification like CWT/COSE (EAT) and agility is built in to the specification. Roll your own stuff, and you are probably in trouble.

But there is more than formats and specifications needed to support agility.
People have to use a variety of things so that software regularly is ready to accept the variety.

--
Michael Richardson <mcr+IETF@...> . o O ( IPv6 IøT consulting )
Sandelman Software Works Inc, Ottawa and Worldwide


Re: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

Dick Brooks
 

Thank you Jean, I have added your name to the growing list of parties that have expressed an interest in joining this collaboration.

 

FYI: I’ve also reached out to ITI and BSA to collaborate on this.

 

I see this as a unique opportunity to show that the “Big Guys” (BSA/ITI) and the little SMB’s that produce software are coming together on this very important opportunity to collaborate on an item that affects all of us.

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: SCITT <scitt-bounces@...> On Behalf Of L Jean Camp
Sent: Saturday, April 29, 2023 10:20 AM
To: spdx@...
Cc: scitt@...
Subject: Re: [SCITT] [spdx] CISA's proposed attestation form is now available and they are seeking comments

 

I am interested. Also I would like to know if anyone else has any interest in ensuring attestation standards have space to enable cryptographic agility or move towards self attesting addresses?

 

On Sat, Apr 29, 2023 at 9:34 AM Dick Brooks <dick@...> wrote:

FYI: I’m envisioning a similar process to what was used by the SBOM Special Internet Group (SBOM SIG), contained in this filing to NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 9:21 AM
To: 'scitt@...' <scitt@...>; 'spdx@...' <spdx@...>
Subject: CISA's proposed attestation form is now available and they are seeking comments

 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

--


Re: CISA's proposed attestation form is now available and they are seeking comments

Dick Brooks
 

FYI: I’m envisioning a similar process to what was used by the SBOM Special Internet Group (SBOM SIG), contained in this filing to NIST:

https://www.nist.gov/document/responses-enhancing-software-supply-chain-security-sbom

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: Dick Brooks <dick@...>
Sent: Saturday, April 29, 2023 9:21 AM
To: 'scitt@...' <scitt@...>; 'spdx@...' <spdx@...>
Subject: CISA's proposed attestation form is now available and they are seeking comments

 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 


CISA's proposed attestation form is now available and they are seeking comments

Dick Brooks
 

Hello Everyone,

 

CISA is seeking comments on their proposed self-attestation form for OMB M-22-18 and EO 14028.

 

Is there any interest in doing a joint comment filing to CISA? Please respond to this email if interested in a collaborative, joint response to CISA.

I’ll be happy to facilitate the response.

information has recently been updated and is now available.

CISA Requests for Comment on Secure Software Self-Attestation Form

04/28/2023 02:00 PM EDT

CISA has issued requests for comment on the Secure Software Self-Attestation Form. CISA, in coordination with the Office of Budget and Management (OMB), released proposed guidance on secure software. This guidance seeks to secure software leveraged by the federal government. CISA expects agencies to use this proposed form to reduce the risk to the federal environment, thereby implementing a standardized process for agencies and software producers that will create transparency on the security of software development efforts.
 
Visit CISA.gov/secure-software-attestation-form for more information and to review the document. The comment period is open until June 26, 2023. CISA is specifically requesting insight on the feasibility, clarity, and usefulness of the document. To submit a comment, click the comment box at the top of Regulations.gov.

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 


Elucidating why I'm leaving SPDX

Sebastian Crane
 

Dear all,

I have relished the intellectual company of the SPDX community. There has been
no other open source community that I have felt more welcomed in, nor one that
shows so much potential for the entire computer software industry. Regrettably,
though, I have observed a growing number of issues regarding the direction of
the project and the missed opportunities to improve the accountability of the
leadership. As a result, I'm writing to explain my decision to resign from my
role on the Steering Committee as SPDX Outreach Team Lead and to withdraw for
the time being from my involvement in the Legal Team, Tech Team and the related
Serialisation Focus Group and Canonicalisation Committee.

A number of people have been appointed to positions of responsibility within
SPDX, including most recently a Marketing Manager. This has been done without
the consultation, approval or notification of myself, my fellow Outreach Team
Leads or even the Steering Committee. Additional support in SPDX's Outreach
Team activities is always appreciated, and having had the pleasure of meeting
the new Marketing Manager earlier in the week, I have been left with no doubt as
to their ability to make a positive difference to the project. However, the
lack of communication preceding this recruitment leaves the Steering Committee
unable to strategically coordinate SPDX's growth, simply because it is unaware
of what's going on!

Many of you will be aware that one of the long-term projects that I have been
engaged with is to rebuild the SPDX website, designing it with the members of
the Outreach Team in order to allow the entire SPDX community to collaborate
directly on editing and improving the site. However, I have been made aware
that there is now a separate effort to start substantial development on SPDX's
web presence. It does not make sense for me to continue with the SPDX website
simply to duplicate the effort. Although I have offered to join forces and work
together on the website, this offer has been declined.

As a volunteer, the openness and transparency of SPDX has been a great
motivating factor for me. I would like to see the SPDX Steering Committee be
proactive, rather than merely reactive, and to actively form a coherent strategy
for the future. Fragmented discussions, inadequate records of consensus
decisions and their rationale and inconsistent adherence to process all inhibit
this goal.

SPDX is privileged to have the participation of dozens of experts and
consequently I feel privileged to have been a part of such a special community.
I hope that this email helps to elucidate my reasons for leaving, and that the
relevant parties may reflect on the points above to ensure SPDX stays a
welcoming, relevant and consensus-driven community.

Best wishes,

Sebastian Crane


Re: SPDX Gen Meeting Follow up- Mistake and Thanks

Joe Bussell
 

The WDK that contains our SBOM and COSE tools is now available through the Windows Insider Program. I would appreciate any feedback on the tools or the delivery process.

 

Register to for the Windows Insider Program (Free) by following the instructions here:

Get started with the Windows Insider Program - Windows Insider Program | Microsot Learn

 

Once registered go to the Windows Driver Kit Insider page here:

Download Windows Insider Preview WDK (microsoft.com)

 

From this page download and install the SDK and the WDK.

 

Once installed the SBOM tools are located in <kitsRoots>\10\Tools\<versions>\x64\

·         sbom-tool-win-x64.exe

·         CoseSignTool.exe

 

Using the tools:

SBOM tool

The SBOM tool is an open-source tool. See the project's GitHub repository for documentation that covers how to run and use the tool. GitHub - microsoft/sbom-tool: The SBOM tool is a highly scalable and enterprise ready tool to create SPDX 2.2 compatible SBOMs for any variety of artifacts.

 

·         sbom-tool-win-x64.exe generate [<options>]

 

COSE Tool

CoseSignTool.exe is a command-line tool that uses the following syntax:

·         CoseSignTool.exe [Sign|Validate|Get] [<options>]

To see available options use /?

 

OPTION

DESCRIPTION

 

Sign

Signs a file or stream.

 

Validate

Validates a signature file or stream against the signed payload

 

Get

Gets the original payload from a COSE embed-signed file and writes it to console or to a new file.

 

 

For signing, you must supply a private key certificate to sign with. Validate and Get operations require one or more public key certificates for the COSE signature to root to. In either case, the certificates may be supplied as files or as thumbprints of certificates in the Windows Certificate Store.

 

 

From: spdx@... <spdx@...> On Behalf Of May Wang via lists.spdx.org
Sent: Wednesday, April 12, 2023 10:25 PM
To: spdx@...
Cc: May Wang via lists.spdx.org <maywang=paloaltonetworks.com@...>; Phil Odence <Phil.Odence@...>
Subject: [EXTERNAL] Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Joe, 

 

As you know well, medical device security is a big challenge.  SBOM is probably needed most in healthcare as you pointed out.  We have lots of healthcare customers asking for SBOM, but many MDMs don't provide it.  That's why we released it in our product trying to help.  With increasing regulation requirements, such as the recent one: FDA will refuse new medical devices for cybersecurity reasons on Oct. 1, hopefully more enforcement will be put on standards like IEC 62304 you mentioned.  That will definitely push for more SBOM adoption.   

 

Dick, 

 

Thank you for your explanation and the additional info.  We don't have APIs for testing purposes right now.  We can try to put it on the roadmap, but that might take a while. :)  Thanks!

 

--

May Wang, Ph.D.  |  CTO, IoT Security

Palo Alto Networks  |  3000 Tannery Way  |  Santa Clara, CA 95054  |  USA

Email: may@... |  www.paloaltonetworks.com

 

   

The content of this message is the proprietary and confidential property of Palo Alto Networks, and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by e-mail. Any unauthorized use or distribution of the content of this message is prohibited.

 

 

 

 

On Wed, Apr 12, 2023 at 6:08 AM Joseph Silvia via lists.spdx.org <jsilvia=orielstat.com@...> wrote:

Hi Dick,

 

Thank you so much for the explanation. I have yet to see an SPDX representation as well and trying to wrap my head around some of these SBOM challenges in the Medical Device space where many MDMs are using a combination of FOSS, COTS and OTS in the development of their software not to mention who knows what contract manufacturers are using.

 

@May Do you know what the impact of all of this means in regard to IoMT and in particular, 62304 with the requirement to identify SOUP items?

 

Thanks,

Joe

 

Joseph D. Silvia
Director Software Quality Training and Consulting
Oriel STAT A MATRIX | Improving Workplace Performance Since 1968

1055 Thomas Jefferson St. NW, Suite 304

Washington, DC 20007

Office:732.906.6142 Mobile:781.526.5636 | jsilvia@... 

View Our Training Catalog

Follow us: LinkedIn | Blog orielstat.com

 

This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential.  If you are not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited.  If you have received this communication in error, notify the sender immediately by return email and delete the message and any attachments from your system.

 

From: spdx@... <spdx@...> On Behalf Of Dick Brooks
Sent: Wednesday, April 12, 2023 8:25 AM
To: spdx@...
Cc: 'Phil Odence' <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Hi Joe,

 

Both formats satisfy the NIST VDR data requirements identified in SP 800-161 RA-5, IMO.

 

REA uses an explicit model, listing each component and its vulnerability search status, including those with no vulnerabilities reported. It also supports SPDX and CycloneDX SBOM formats.

 

The CycloneDX VDR format uses an implicit model, listing only those components with reported vulnerabilities. I believe it can support both SPDX and CycloneDX SBOM formats, but I’ve not seen an SPDX representation.

 

The easiest way to see the differences is to view an example of each:

 

REA VDR:

https://raw.githubusercontent.com/rjb4standards/REA-Products/master/SBOMVDR_JSON/VDR_118.json

 

CycloneDX VDR:

https://raw.githubusercontent.com/rjb4standards/REA-Products/master/CDXVEX/CDX14.xml

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of Joseph Silvia via lists.spdx.org
Sent: Wednesday, April 12, 2023 8:14 AM
To: spdx@...
Cc: 'Phil Odence' <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Hello Dick,

 

You stated the REA has offered to withdraw it’s VDR format if the industry agrees to endorse the CycloneDX VDR format. Can you provide more details on the similarities and differences between the REA and CycloneDX VDR format?

 

Thanks,

Joe

 

Joseph D. Silvia
Director Software Quality Training and Consulting
Oriel STAT A MATRIX | Improving Workplace Performance Since 1968

1055 Thomas Jefferson St. NW, Suite 304

Washington, DC 20007

Office:732.906.6142 Mobile:781.526.5636 | jsilvia@... 

View Our Training Catalog

Follow us: LinkedIn | Blog orielstat.com

 

This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential.  If you are not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited.  If you have received this communication in error, notify the sender immediately by return email and delete the message and any attachments from your system.

 

From: spdx@... <spdx@...> On Behalf Of Dick Brooks
Sent: Wednesday, April 12, 2023 7:55 AM
To: spdx@...
Cc: 'Phil Odence' <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

May,

 

Thank you for the quick response.

 

With regard to testing; some of the spdx tool vendors conduct interoperability testing by sharing artifacts and reporting on any issues encountered. The DocFest is a formal version of this testing. Would Palo Alto Networks be willing to share their SPDX artifacts, confidentially, with spdx tool vendors for interoperability testing purposes only?

 

I agree with your findings on the NIST VDR; NIST identified the VDR data to be included, but not a specific format. There are two open source NIST VDR “interpretation” formats available, one from OWASP CycloneDX and the other from REA:

Here’s an example of the open-source REA VDR format:

https://raw.githubusercontent.com/rjb4standards/REA-Products/master/SBOMVDR_JSON/VDR_118.json

 

I also wrote an article describing the NIST SBOM VDR that ties back to the SP 800-161 standard and other NIST materials where VDR is referenced:

https://energycentral.com/c/pip/what-nist-sbom-vulnerability-disclosure-report-vdr

 

FYI: REA has offered to withdraw it’s VDR format if the industry agrees to endorse the CycloneDX VDR format. Also, note, REA offered to freely transfer its open-source VDR format to the Linux Foundation, when it was first introduced; the offer was never acted on.

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of May Wang via lists.spdx.org
Sent: Wednesday, April 12, 2023 2:59 AM
To: spdx@...
Cc: Phil Odence <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Dick, 

 

Thank you for your questions. 

 

1. Our spdx-based IoT SBOM is available to all our customers.  I am not sure about the specific "testing purposes" you are referring to, happy to talk more details offline. 

 

2. Good question.  In addition to the SBOM info, we also provided links from SBOM to vulnerabilities, based on our own vulnerability database and some CVEs for now.  We do plan to 1) expand to more vulnerability databases and CVEs. 2) expand to cover more devices. 3) the latest NIST VDR document provides good guidance but did not prescribe specific format, we will closely follow up any updates from NIST. 

 

Thank you, 

--

May Wang, Ph.D.  |  CTO, IoT Security

Palo Alto Networks  |  3000 Tannery Way  |  Santa Clara, CA 95054  |  USA

Email: may@... |  www.paloaltonetworks.com

 

Image removed by sender.    Image removed by sender.Image removed by sender.Image removed by sender.

The content of this message is the proprietary and confidential property of Palo Alto Networks, and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by e-mail. Any unauthorized use or distribution of the content of this message is prohibited.

 

 

On Tue, Apr 11, 2023 at 5:10 AM Dick Brooks <dick@...> wrote:

Thanks May.

 

Two questions:

  1. Is the SPDX artifact available to use for testing purposes?
  2. Is Palo Alto Networks also planning to issue NIST SBOM Vulnerability Disclosure Reports (VDR) that will be linked to the published SBOM?

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of May Wang via lists.spdx.org
Sent: Tuesday, April 11, 2023 12:05 AM
To: Phil Odence <Phil.Odence@...>
Cc: SPDX-general <spdx@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Thank you, Phil, the members of the SPDX Steering Committee, and the SPDX Community.  

 

I am grateful for the fruitful year we have had working together. This year, we released the first loT SBOM product by Palo Alto Networks based on SPDX. Such a significant milestone couldn't have been possible without your support and leadership. I look forward to our continued collaboration to advance the adoption of SPDX and foster innovation in SBOM, especially in cybersecurity.

 

--

May Wang, Ph.D.  |  CTO, IoT Security

Palo Alto Networks  |  3000 Tannery Way  |  Santa Clara, CA 95054  |  USA

Email: may@... |  www.paloaltonetworks.com

 

Image removed by sender.    Image removed by sender.Image removed by sender.Image removed by sender.

The content of this message is the proprietary and confidential property of Palo Alto Networks, and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by e-mail. Any unauthorized use or distribution of the content of this message is prohibited.

 


 

 


 

 


Google announce open devs.dep API

Steve Kilbane
 

Google have opened their deps.dev API, covering dependencies, license information and vulnerabilities. Right now, it's open and free to use – you don't even need an API key.

 

Blog post here: https://security.googleblog.com/2023/04/announcing-depsdev-api-critical.html

 

 

steve

 

 


Re: SPDX Gen Meeting Follow up- Mistake and Thanks

May Wang
 

Joe, 

As you know well, medical device security is a big challenge.  SBOM is probably needed most in healthcare as you pointed out.  We have lots of healthcare customers asking for SBOM, but many MDMs don't provide it.  That's why we released it in our product trying to help.  With increasing regulation requirements, such as the recent one: FDA will refuse new medical devices for cybersecurity reasons on Oct. 1, hopefully more enforcement will be put on standards like IEC 62304 you mentioned.  That will definitely push for more SBOM adoption.   

Dick, 

Thank you for your explanation and the additional info.  We don't have APIs for testing purposes right now.  We can try to put it on the roadmap, but that might take a while. :)  Thanks!

--

May Wang, Ph.D.  |  CTO, IoT Security

Palo Alto Networks  |  3000 Tannery Way  |  Santa Clara, CA 95054  |  USA

Email: may@... |  www.paloaltonetworks.com


   

The content of this message is the proprietary and confidential property of Palo Alto Networks, and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by e-mail. Any unauthorized use or distribution of the content of this message is prohibited.





On Wed, Apr 12, 2023 at 6:08 AM Joseph Silvia via lists.spdx.org <jsilvia=orielstat.com@...> wrote:

Hi Dick,

 

Thank you so much for the explanation. I have yet to see an SPDX representation as well and trying to wrap my head around some of these SBOM challenges in the Medical Device space where many MDMs are using a combination of FOSS, COTS and OTS in the development of their software not to mention who knows what contract manufacturers are using.

 

@May Do you know what the impact of all of this means in regard to IoMT and in particular, 62304 with the requirement to identify SOUP items?

 

Thanks,

Joe

 

Joseph D. Silvia
Director Software Quality Training and Consulting
Oriel STAT A MATRIX | Improving Workplace Performance Since 1968

1055 Thomas Jefferson St. NW, Suite 304

Washington, DC 20007

Office:732.906.6142 Mobile:781.526.5636 | jsilvia@... 

View Our Training Catalog

Follow us: LinkedIn | Blog orielstat.com

 

This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential.  If you are not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited.  If you have received this communication in error, notify the sender immediately by return email and delete the message and any attachments from your system.

 

From: spdx@... <spdx@...> On Behalf Of Dick Brooks
Sent: Wednesday, April 12, 2023 8:25 AM
To: spdx@...
Cc: 'Phil Odence' <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Hi Joe,

 

Both formats satisfy the NIST VDR data requirements identified in SP 800-161 RA-5, IMO.

 

REA uses an explicit model, listing each component and its vulnerability search status, including those with no vulnerabilities reported. It also supports SPDX and CycloneDX SBOM formats.

 

The CycloneDX VDR format uses an implicit model, listing only those components with reported vulnerabilities. I believe it can support both SPDX and CycloneDX SBOM formats, but I’ve not seen an SPDX representation.

 

The easiest way to see the differences is to view an example of each:

 

REA VDR:

https://raw.githubusercontent.com/rjb4standards/REA-Products/master/SBOMVDR_JSON/VDR_118.json

 

CycloneDX VDR:

https://raw.githubusercontent.com/rjb4standards/REA-Products/master/CDXVEX/CDX14.xml

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of Joseph Silvia via lists.spdx.org
Sent: Wednesday, April 12, 2023 8:14 AM
To: spdx@...
Cc: 'Phil Odence' <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Hello Dick,

 

You stated the REA has offered to withdraw it’s VDR format if the industry agrees to endorse the CycloneDX VDR format. Can you provide more details on the similarities and differences between the REA and CycloneDX VDR format?

 

Thanks,

Joe

 

Joseph D. Silvia
Director Software Quality Training and Consulting
Oriel STAT A MATRIX | Improving Workplace Performance Since 1968

1055 Thomas Jefferson St. NW, Suite 304

Washington, DC 20007

Office:732.906.6142 Mobile:781.526.5636 | jsilvia@... 

View Our Training Catalog

Follow us: LinkedIn | Blog orielstat.com

 

This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confidential.  If you are not the intended recipient or an authorized representative of the intended recipient, you are hereby notified that any dissemination of this communication is strictly prohibited.  If you have received this communication in error, notify the sender immediately by return email and delete the message and any attachments from your system.

 

From: spdx@... <spdx@...> On Behalf Of Dick Brooks
Sent: Wednesday, April 12, 2023 7:55 AM
To: spdx@...
Cc: 'Phil Odence' <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

May,

 

Thank you for the quick response.

 

With regard to testing; some of the spdx tool vendors conduct interoperability testing by sharing artifacts and reporting on any issues encountered. The DocFest is a formal version of this testing. Would Palo Alto Networks be willing to share their SPDX artifacts, confidentially, with spdx tool vendors for interoperability testing purposes only?

 

I agree with your findings on the NIST VDR; NIST identified the VDR data to be included, but not a specific format. There are two open source NIST VDR “interpretation” formats available, one from OWASP CycloneDX and the other from REA:

Here’s an example of the open-source REA VDR format:

https://raw.githubusercontent.com/rjb4standards/REA-Products/master/SBOMVDR_JSON/VDR_118.json

 

I also wrote an article describing the NIST SBOM VDR that ties back to the SP 800-161 standard and other NIST materials where VDR is referenced:

https://energycentral.com/c/pip/what-nist-sbom-vulnerability-disclosure-report-vdr

 

FYI: REA has offered to withdraw it’s VDR format if the industry agrees to endorse the CycloneDX VDR format. Also, note, REA offered to freely transfer its open-source VDR format to the Linux Foundation, when it was first introduced; the offer was never acted on.

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of May Wang via lists.spdx.org
Sent: Wednesday, April 12, 2023 2:59 AM
To: spdx@...
Cc: Phil Odence <Phil.Odence@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Dick, 

 

Thank you for your questions. 

 

1. Our spdx-based IoT SBOM is available to all our customers.  I am not sure about the specific "testing purposes" you are referring to, happy to talk more details offline. 

 

2. Good question.  In addition to the SBOM info, we also provided links from SBOM to vulnerabilities, based on our own vulnerability database and some CVEs for now.  We do plan to 1) expand to more vulnerability databases and CVEs. 2) expand to cover more devices. 3) the latest NIST VDR document provides good guidance but did not prescribe specific format, we will closely follow up any updates from NIST. 

 

Thank you, 

--

May Wang, Ph.D.  |  CTO, IoT Security

Palo Alto Networks  |  3000 Tannery Way  |  Santa Clara, CA 95054  |  USA

Email: may@... |  www.paloaltonetworks.com

 

Image removed by sender.    Image removed by sender.Image removed by sender.Image removed by sender.

The content of this message is the proprietary and confidential property of Palo Alto Networks, and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by e-mail. Any unauthorized use or distribution of the content of this message is prohibited.

 

 

On Tue, Apr 11, 2023 at 5:10 AM Dick Brooks <dick@...> wrote:

Thanks May.

 

Two questions:

  1. Is the SPDX artifact available to use for testing purposes?
  2. Is Palo Alto Networks also planning to issue NIST SBOM Vulnerability Disclosure Reports (VDR) that will be linked to the published SBOM?

 

Thanks,

 

Dick Brooks

 

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership

 

Never trust software, always verify and report!

http://www.reliableenergyanalytics.com

Email: dick@...

Tel: +1 978-696-1788

 

From: spdx@... <spdx@...> On Behalf Of May Wang via lists.spdx.org
Sent: Tuesday, April 11, 2023 12:05 AM
To: Phil Odence <Phil.Odence@...>
Cc: SPDX-general <spdx@...>
Subject: Re: [spdx] SPDX Gen Meeting Follow up- Mistake and Thanks

 

Thank you, Phil, the members of the SPDX Steering Committee, and the SPDX Community.  

 

I am grateful for the fruitful year we have had working together. This year, we released the first loT SBOM product by Palo Alto Networks based on SPDX. Such a significant milestone couldn't have been possible without your support and leadership. I look forward to our continued collaboration to advance the adoption of SPDX and foster innovation in SBOM, especially in cybersecurity.

 

--

May Wang, Ph.D.  |  CTO, IoT Security

Palo Alto Networks  |  3000 Tannery Way  |  Santa Clara, CA 95054  |  USA

Email: may@... |  www.paloaltonetworks.com

 

Image removed by sender.    Image removed by sender.Image removed by sender.Image removed by sender.

The content of this message is the proprietary and confidential property of Palo Alto Networks, and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by e-mail. Any unauthorized use or distribution of the content of this message is prohibited.