Schema URL

Type: object

Properties

bomFormat string required

Specifies the format of the BOM. This helps to identify the file as CycloneDX since BOMs do not have a filename convention nor does JSON schema support namespaces. This value MUST be "CycloneDX".

Values: "CycloneDX"
specVersion string required

The version of the CycloneDX specification a BOM conforms to (starting at version 1.2).

Examples: "1.5"
$schema string
Values: "http://cyclonedx.org/schema/bom-1.5.schema.json"
serialNumber string

Every BOM generated SHOULD have a unique serial number, even if the contents of the BOM have not changed over time. If specified, the serial number MUST conform to RFC-4122. Use of serial numbers are RECOMMENDED.

Examples: "urn:uuid:3e671687-395b-41f5-a30f-a58921a69b79"
pattern=^urn:uuid:[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$
version integer

Whenever an existing BOM is modified, either manually or through automated processes, the version of the BOM SHOULD be incremented by 1. When a system is presented with multiple BOMs with identical serial numbers, the system SHOULD use the most recent version of the BOM. The default version is '1'.

Default: 1
Examples: 1
min=1
metadata object
9 nested properties
timestamp string

The date and time (timestamp) when the BOM was created.

format=date-time
lifecycles object[]
tools object | tool[]

The person(s) who created the BOM. Authors are common in BOMs created through manual processes. BOMs created through automated means may not have authors.

component object
27 nested properties
type string required

Specifies the type of component. For software components, classify as application if no more specific appropriate classification is available or cannot be determined for the component. Types include:

Values: "application" "framework" "library" "container" "platform" "operating-system" "device" "device-driver" "firmware" "file" "machine-learning-model" "data"
Examples: "library"
name string required

The name of the component. This will often be a shortened, single name of the component. Examples: commons-lang3 and jquery

Examples: "tomcat-catalina"
mime-type string

The optional mime-type of the component. When used on file components, the mime-type can provide additional context about the kind of file being represented such as an image, font, or executable. Some library or framework components may also have an associated mime-type.

Examples: "image/jpeg"
pattern=^[-+a-z0-9.]+/[-+a-z0-9.]+$
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
supplier object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

author string

The person(s) or organization(s) that authored the component

Examples: "Acme Inc"
publisher string

The person(s) or organization(s) that published the component

Examples: "Acme Inc"
group string

The grouping name or identifier. This will often be a shortened, single name of the company or project that produced the component, or the source package or domain name. Whitespace and special characters should be avoided. Examples include: apache, org.apache.commons, and apache.org.

Examples: "com.acme"
version string

The component version. The version should ideally comply with semantic versioning but is not enforced.

Examples: "9.0.14"
description string

Specifies a description for the component

scope string

Specifies the scope of the component. If scope is not specified, 'required' scope SHOULD be assumed by the consumer of the BOM.

Default: "required"
Values: "required" "optional" "excluded"
hashes hash[]
licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright string

A copyright notice informing users of the underlying claims to copyright ownership in a published work.

Examples: "Acme Inc"
cpe string

Specifies a well-formed CPE name that conforms to the CPE 2.2 or 2.3 specification. See [https://nvd.nist.gov/products/cpe](https://nvd.nist.gov/products/cpe)

Examples: "cpe:2.3:a:acme:component_framework:-:*:*:*:*:*:*:*"
purl string

Specifies the package-url (purl). The purl, if specified, MUST be valid and conform to the specification defined at: [https://github.com/package-url/purl-spec](https://github.com/package-url/purl-spec)

Examples: "pkg:maven/com.acme/[email protected]?packaging=jar"
swid object

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

7 nested properties
tagId string required

Maps to the tagId of a SoftwareIdentity.

name string required

Maps to the name of a SoftwareIdentity.

version string

Maps to the version of a SoftwareIdentity.

Default: "0.0"
tagVersion integer

Maps to the tagVersion of a SoftwareIdentity.

Default: 0
patch boolean

Maps to the patch of a SoftwareIdentity.

Default: false
text object

Specifies the metadata and content for an attachment.

url string

The URL to the SWID file.

format=iri-reference
modified boolean

[Deprecated] - DO NOT USE. This will be removed in a future version. Use the pedigree element instead to supply information on exactly how the component was modified. A boolean value indicating if the component has been modified from the original. A value of true indicates the component is a derivative of the original. A value of false indicates the component has not been modified from the original.

pedigree object

Component pedigree is a way to document complex supply chain scenarios where components are created, distributed, modified, redistributed, combined with other components, etc. Pedigree supports viewing this complex chain from the beginning, the end, or anywhere in the middle. It also provides a way to document variants where the exact relation may not be known.

6 nested properties
ancestors component[]

Describes zero or more components in which a component is derived from. This is commonly used to describe forks from existing projects where the forked version contains a ancestor node containing the original component it was forked from. For example, Component A is the original component. Component B is the component being used and documented in the BOM. However, Component B contains a pedigree node with a single ancestor documenting Component A - the original component from which Component B is derived from.

descendants component[]

Descendants are the exact opposite of ancestors. This provides a way to document all forks (and their forks) of an original or root component.

variants component[]

Variants describe relations where the relationship between the components are not known. For example, if Component A contains nearly identical code to Component B. They are both related, but it is unclear if one is derived from the other, or if they share a common ancestor.

commits commit[]

A list of zero or more commits which provide a trail describing how the component deviates from an ancestor, descendant, or variant.

patches patch[]

A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complimentary to commits or may be used in place of commits.

notes string

Notes, observations, and other non-structured commentary describing the components pedigree.

externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

components component[]

A list of software and hardware components included in the parent component. This is not a dependency tree. It provides a way to specify a hierarchical representation of component assemblies, similar to system → subsystem → parts assembly in physical supply chains.

uniqueItems=true
evidence object

Provides the ability to document evidence collected through various forms of extraction or analysis.

5 nested properties
identity object

Evidence that substantiates the identity of a component.

occurrences object[]

Evidence of individual instances of a component spread across multiple locations.

callstack object

Evidence of the components use through the callstack.

licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright copyright[]
releaseNotes object
11 nested properties
type string required

The software versioning type. It is RECOMMENDED that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

  • major = A major release may contain significant changes or may introduce breaking changes.
  • minor = A minor release, also known as an update, may contain a smaller number of changes than major releases.
  • patch = Patch releases are typically unplanned and may resolve defects or important security issues.
  • pre-release = A pre-release may include alpha, beta, or release candidates and typically have limited support. They provide the ability to preview a release prior to its general availability.
  • internal = Internal releases are not for public consumption and are intended to be used exclusively by the project or manufacturer that produced it.
Examples: "major", "minor", "patch", "pre-release", "internal"
title string

The title of the release.

featuredImage string

The URL to an image that may be prominently displayed with the release note.

format=iri-reference
socialImage string

The URL to an image that may be used in messaging on social media platforms.

format=iri-reference
description string

A short description of the release.

timestamp string

The date and time (timestamp) when the release note was created.

format=date-time
aliases string[]

One or more alternate names the release may be referred to. This may include unofficial terms used by development and marketing teams (e.g. code names).

tags string[]

One or more tags that may aid in search or retrieval of the release note.

resolves issue[]

A collection of issues that have been resolved.

notes note[]

Zero or more release notes containing the locale and content. Multiple note objects may be specified to support release notes in a wide variety of languages.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

modelCard object

A model card describes the intended uses of a machine learning model and potential limitations, including biases and ethical considerations. Model cards typically contain the training parameters, which datasets were used to train the model, performance metrics, and other relevant data useful for ML transparency. This object SHOULD be specified for any component of type machine-learning-model and MUST NOT be specified for other component types.

5 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
modelParameters object

Hyper-parameters for construction of the model.

quantitativeAnalysis object

A quantitative analysis of the model

considerations object

What considerations should be taken into account regarding the model's construction, training, and application?

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

This object SHOULD be specified for any component of type data and MUST NOT be specified for other component types.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

manufacture object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

supplier object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

components component[]

A list of software and hardware components.

uniqueItems=true
services service[]

A list of services. This may include microservices, function-as-a-service, and other types of network or intra-process services.

uniqueItems=true
externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

dependencies dependency[]

Provides the ability to document dependency relationships.

uniqueItems=true
compositions compositions[]

Compositions describe constituent parts (including components, services, and dependency relationships) and their completeness. The completeness of vulnerabilities expressed in a BOM may also be described.

uniqueItems=true
vulnerabilities vulnerability[]

Vulnerabilities identified in components or services.

uniqueItems=true
annotations annotations[]

Comments made by people, organizations, or tools about any object with a bom-ref, such as components, services, vulnerabilities, or the BOM itself. Unlike inventory information, annotations may contain opinion or commentary from various stakeholders. Annotations may be inline (with inventory) or externalized via BOM-Link, and may optionally be signed.

uniqueItems=true
formulation formula[]

Describes how a component or service was manufactured or deployed. This is achieved through the use of formulas, workflows, tasks, and steps, which declare the precise steps to reproduce along with the observed formulas describing the steps which transpired in the manufacturing process.

uniqueItems=true
properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

Definitions

refType string

Identifier for referable and therefore interlink-able elements.

refLinkType

Descriptor for an element identified by the attribute 'bom-ref' in the same BOM document. In contrast to bomLinkElementType.

bomLinkDocumentType string

Descriptor for another BOM document. See https://cyclonedx.org/capabilities/bomlink/

bomLinkElementType string

Descriptor for an element in a BOM document. See https://cyclonedx.org/capabilities/bomlink/

metadata object
timestamp string

The date and time (timestamp) when the BOM was created.

format=date-time
lifecycles object[]
tools object | tool[]

The person(s) who created the BOM. Authors are common in BOMs created through manual processes. BOMs created through automated means may not have authors.

component object
27 nested properties
type string required

Specifies the type of component. For software components, classify as application if no more specific appropriate classification is available or cannot be determined for the component. Types include:

Values: "application" "framework" "library" "container" "platform" "operating-system" "device" "device-driver" "firmware" "file" "machine-learning-model" "data"
Examples: "library"
name string required

The name of the component. This will often be a shortened, single name of the component. Examples: commons-lang3 and jquery

Examples: "tomcat-catalina"
mime-type string

The optional mime-type of the component. When used on file components, the mime-type can provide additional context about the kind of file being represented such as an image, font, or executable. Some library or framework components may also have an associated mime-type.

Examples: "image/jpeg"
pattern=^[-+a-z0-9.]+/[-+a-z0-9.]+$
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
supplier object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

author string

The person(s) or organization(s) that authored the component

Examples: "Acme Inc"
publisher string

The person(s) or organization(s) that published the component

Examples: "Acme Inc"
group string

The grouping name or identifier. This will often be a shortened, single name of the company or project that produced the component, or the source package or domain name. Whitespace and special characters should be avoided. Examples include: apache, org.apache.commons, and apache.org.

Examples: "com.acme"
version string

The component version. The version should ideally comply with semantic versioning but is not enforced.

Examples: "9.0.14"
description string

Specifies a description for the component

scope string

Specifies the scope of the component. If scope is not specified, 'required' scope SHOULD be assumed by the consumer of the BOM.

Default: "required"
Values: "required" "optional" "excluded"
hashes hash[]
licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright string

A copyright notice informing users of the underlying claims to copyright ownership in a published work.

Examples: "Acme Inc"
cpe string

Specifies a well-formed CPE name that conforms to the CPE 2.2 or 2.3 specification. See [https://nvd.nist.gov/products/cpe](https://nvd.nist.gov/products/cpe)

Examples: "cpe:2.3:a:acme:component_framework:-:*:*:*:*:*:*:*"
purl string

Specifies the package-url (purl). The purl, if specified, MUST be valid and conform to the specification defined at: [https://github.com/package-url/purl-spec](https://github.com/package-url/purl-spec)

Examples: "pkg:maven/com.acme/[email protected]?packaging=jar"
swid object

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

7 nested properties
tagId string required

Maps to the tagId of a SoftwareIdentity.

name string required

Maps to the name of a SoftwareIdentity.

version string

Maps to the version of a SoftwareIdentity.

Default: "0.0"
tagVersion integer

Maps to the tagVersion of a SoftwareIdentity.

Default: 0
patch boolean

Maps to the patch of a SoftwareIdentity.

Default: false
text object

Specifies the metadata and content for an attachment.

url string

The URL to the SWID file.

format=iri-reference
modified boolean

[Deprecated] - DO NOT USE. This will be removed in a future version. Use the pedigree element instead to supply information on exactly how the component was modified. A boolean value indicating if the component has been modified from the original. A value of true indicates the component is a derivative of the original. A value of false indicates the component has not been modified from the original.

pedigree object

Component pedigree is a way to document complex supply chain scenarios where components are created, distributed, modified, redistributed, combined with other components, etc. Pedigree supports viewing this complex chain from the beginning, the end, or anywhere in the middle. It also provides a way to document variants where the exact relation may not be known.

6 nested properties
ancestors component[]

Describes zero or more components in which a component is derived from. This is commonly used to describe forks from existing projects where the forked version contains a ancestor node containing the original component it was forked from. For example, Component A is the original component. Component B is the component being used and documented in the BOM. However, Component B contains a pedigree node with a single ancestor documenting Component A - the original component from which Component B is derived from.

descendants component[]

Descendants are the exact opposite of ancestors. This provides a way to document all forks (and their forks) of an original or root component.

variants component[]

Variants describe relations where the relationship between the components are not known. For example, if Component A contains nearly identical code to Component B. They are both related, but it is unclear if one is derived from the other, or if they share a common ancestor.

commits commit[]

A list of zero or more commits which provide a trail describing how the component deviates from an ancestor, descendant, or variant.

patches patch[]

A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complimentary to commits or may be used in place of commits.

notes string

Notes, observations, and other non-structured commentary describing the components pedigree.

externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

components component[]

A list of software and hardware components included in the parent component. This is not a dependency tree. It provides a way to specify a hierarchical representation of component assemblies, similar to system → subsystem → parts assembly in physical supply chains.

uniqueItems=true
evidence object

Provides the ability to document evidence collected through various forms of extraction or analysis.

5 nested properties
identity object

Evidence that substantiates the identity of a component.

occurrences object[]

Evidence of individual instances of a component spread across multiple locations.

callstack object

Evidence of the components use through the callstack.

licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright copyright[]
releaseNotes object
11 nested properties
type string required

The software versioning type. It is RECOMMENDED that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

  • major = A major release may contain significant changes or may introduce breaking changes.
  • minor = A minor release, also known as an update, may contain a smaller number of changes than major releases.
  • patch = Patch releases are typically unplanned and may resolve defects or important security issues.
  • pre-release = A pre-release may include alpha, beta, or release candidates and typically have limited support. They provide the ability to preview a release prior to its general availability.
  • internal = Internal releases are not for public consumption and are intended to be used exclusively by the project or manufacturer that produced it.
Examples: "major", "minor", "patch", "pre-release", "internal"
title string

The title of the release.

featuredImage string

The URL to an image that may be prominently displayed with the release note.

format=iri-reference
socialImage string

The URL to an image that may be used in messaging on social media platforms.

format=iri-reference
description string

A short description of the release.

timestamp string

The date and time (timestamp) when the release note was created.

format=date-time
aliases string[]

One or more alternate names the release may be referred to. This may include unofficial terms used by development and marketing teams (e.g. code names).

tags string[]

One or more tags that may aid in search or retrieval of the release note.

resolves issue[]

A collection of issues that have been resolved.

notes note[]

Zero or more release notes containing the locale and content. Multiple note objects may be specified to support release notes in a wide variety of languages.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

modelCard object

A model card describes the intended uses of a machine learning model and potential limitations, including biases and ethical considerations. Model cards typically contain the training parameters, which datasets were used to train the model, performance metrics, and other relevant data useful for ML transparency. This object SHOULD be specified for any component of type machine-learning-model and MUST NOT be specified for other component types.

5 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
modelParameters object

Hyper-parameters for construction of the model.

quantitativeAnalysis object

A quantitative analysis of the model

considerations object

What considerations should be taken into account regarding the model's construction, training, and application?

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

This object SHOULD be specified for any component of type data and MUST NOT be specified for other component types.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

manufacture object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

supplier object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

tool object

[Deprecated] - DO NOT USE. This will be removed in a future version. This will be removed in a future version. Use component or service instead. Information about the automated or manual tool used

vendor string

The name of the vendor who created the tool

name string

The name of the tool

version string

The version of the tool

hashes hash[]

The hashes of the tool (if applicable).

externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

organizationalEntity object
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

organizationalContact object
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of a contact

Examples: "Contact name"
email string

The email address of the contact.

Examples: "[email protected]"
format=idn-email
phone string

The phone number of the contact.

Examples: "800-555-1212"
component object
type string required

Specifies the type of component. For software components, classify as application if no more specific appropriate classification is available or cannot be determined for the component. Types include:

Values: "application" "framework" "library" "container" "platform" "operating-system" "device" "device-driver" "firmware" "file" "machine-learning-model" "data"
Examples: "library"
name string required

The name of the component. This will often be a shortened, single name of the component. Examples: commons-lang3 and jquery

Examples: "tomcat-catalina"
mime-type string

The optional mime-type of the component. When used on file components, the mime-type can provide additional context about the kind of file being represented such as an image, font, or executable. Some library or framework components may also have an associated mime-type.

Examples: "image/jpeg"
pattern=^[-+a-z0-9.]+/[-+a-z0-9.]+$
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
supplier object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

author string

The person(s) or organization(s) that authored the component

Examples: "Acme Inc"
publisher string

The person(s) or organization(s) that published the component

Examples: "Acme Inc"
group string

The grouping name or identifier. This will often be a shortened, single name of the company or project that produced the component, or the source package or domain name. Whitespace and special characters should be avoided. Examples include: apache, org.apache.commons, and apache.org.

Examples: "com.acme"
version string

The component version. The version should ideally comply with semantic versioning but is not enforced.

Examples: "9.0.14"
description string

Specifies a description for the component

scope string

Specifies the scope of the component. If scope is not specified, 'required' scope SHOULD be assumed by the consumer of the BOM.

Default: "required"
Values: "required" "optional" "excluded"
hashes hash[]
licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright string

A copyright notice informing users of the underlying claims to copyright ownership in a published work.

Examples: "Acme Inc"
cpe string

Specifies a well-formed CPE name that conforms to the CPE 2.2 or 2.3 specification. See [https://nvd.nist.gov/products/cpe](https://nvd.nist.gov/products/cpe)

Examples: "cpe:2.3:a:acme:component_framework:-:*:*:*:*:*:*:*"
purl string

Specifies the package-url (purl). The purl, if specified, MUST be valid and conform to the specification defined at: [https://github.com/package-url/purl-spec](https://github.com/package-url/purl-spec)

Examples: "pkg:maven/com.acme/[email protected]?packaging=jar"
swid object

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

7 nested properties
tagId string required

Maps to the tagId of a SoftwareIdentity.

name string required

Maps to the name of a SoftwareIdentity.

version string

Maps to the version of a SoftwareIdentity.

Default: "0.0"
tagVersion integer

Maps to the tagVersion of a SoftwareIdentity.

Default: 0
patch boolean

Maps to the patch of a SoftwareIdentity.

Default: false
text object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
url string

The URL to the SWID file.

format=iri-reference
modified boolean

[Deprecated] - DO NOT USE. This will be removed in a future version. Use the pedigree element instead to supply information on exactly how the component was modified. A boolean value indicating if the component has been modified from the original. A value of true indicates the component is a derivative of the original. A value of false indicates the component has not been modified from the original.

pedigree object

Component pedigree is a way to document complex supply chain scenarios where components are created, distributed, modified, redistributed, combined with other components, etc. Pedigree supports viewing this complex chain from the beginning, the end, or anywhere in the middle. It also provides a way to document variants where the exact relation may not be known.

6 nested properties
ancestors component[]

Describes zero or more components in which a component is derived from. This is commonly used to describe forks from existing projects where the forked version contains a ancestor node containing the original component it was forked from. For example, Component A is the original component. Component B is the component being used and documented in the BOM. However, Component B contains a pedigree node with a single ancestor documenting Component A - the original component from which Component B is derived from.

descendants component[]

Descendants are the exact opposite of ancestors. This provides a way to document all forks (and their forks) of an original or root component.

variants component[]

Variants describe relations where the relationship between the components are not known. For example, if Component A contains nearly identical code to Component B. They are both related, but it is unclear if one is derived from the other, or if they share a common ancestor.

commits commit[]

A list of zero or more commits which provide a trail describing how the component deviates from an ancestor, descendant, or variant.

patches patch[]

A list of zero or more patches describing how the component deviates from an ancestor, descendant, or variant. Patches may be complimentary to commits or may be used in place of commits.

notes string

Notes, observations, and other non-structured commentary describing the components pedigree.

externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

components component[]

A list of software and hardware components included in the parent component. This is not a dependency tree. It provides a way to specify a hierarchical representation of component assemblies, similar to system → subsystem → parts assembly in physical supply chains.

uniqueItems=true
evidence object

Provides the ability to document evidence collected through various forms of extraction or analysis.

5 nested properties
identity object

Evidence that substantiates the identity of a component.

4 nested properties
field string required

The identity field of the component which the evidence describes.

Values: "group" "name" "version" "purl" "cpe" "swid" "hash"
confidence number

The overall confidence of the evidence from 0 - 1, where 1 is 100% confidence.

min=0max=1
methods object[]

The methods used to extract and/or analyze the evidence.

tools refLinkType | bomLinkElementType[]

The object in the BOM identified by its bom-ref. This is often a component or service, but may be any object type supporting bom-refs. Tools used for analysis should already be defined in the BOM, either in the metadata/tools, components, or formulation.

uniqueItems=true
occurrences object[]

Evidence of individual instances of a component spread across multiple locations.

callstack object

Evidence of the components use through the callstack.

1 nested properties
frames object[]
licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright copyright[]
releaseNotes object
11 nested properties
type string required

The software versioning type. It is RECOMMENDED that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

  • major = A major release may contain significant changes or may introduce breaking changes.
  • minor = A minor release, also known as an update, may contain a smaller number of changes than major releases.
  • patch = Patch releases are typically unplanned and may resolve defects or important security issues.
  • pre-release = A pre-release may include alpha, beta, or release candidates and typically have limited support. They provide the ability to preview a release prior to its general availability.
  • internal = Internal releases are not for public consumption and are intended to be used exclusively by the project or manufacturer that produced it.
Examples: "major", "minor", "patch", "pre-release", "internal"
title string

The title of the release.

featuredImage string

The URL to an image that may be prominently displayed with the release note.

format=iri-reference
socialImage string

The URL to an image that may be used in messaging on social media platforms.

format=iri-reference
description string

A short description of the release.

timestamp string

The date and time (timestamp) when the release note was created.

format=date-time
aliases string[]

One or more alternate names the release may be referred to. This may include unofficial terms used by development and marketing teams (e.g. code names).

tags string[]

One or more tags that may aid in search or retrieval of the release note.

resolves issue[]

A collection of issues that have been resolved.

notes note[]

Zero or more release notes containing the locale and content. Multiple note objects may be specified to support release notes in a wide variety of languages.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

modelCard object

A model card describes the intended uses of a machine learning model and potential limitations, including biases and ethical considerations. Model cards typically contain the training parameters, which datasets were used to train the model, performance metrics, and other relevant data useful for ML transparency. This object SHOULD be specified for any component of type machine-learning-model and MUST NOT be specified for other component types.

5 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
modelParameters object

Hyper-parameters for construction of the model.

7 nested properties
approach object

The overall approach to learning used by the model for problem solving.

task string

Directly influences the input and/or output. Examples include classification, regression, clustering, etc.

architectureFamily string

The model architecture family such as transformer network, convolutional neural network, residual neural network, LSTM neural network, etc.

modelArchitecture string

The specific architecture of the model such as GPT-1, ResNet-50, YOLOv3, etc.

datasets componentData | object[]

The datasets used to train and evaluate the model.

The input format(s) of the model

The output format(s) from the model

quantitativeAnalysis object

A quantitative analysis of the model

2 nested properties
performanceMetrics performanceMetric[]

The model performance metrics being reported. Examples may include accuracy, F1 score, precision, top-3 error rates, MSC, etc.

graphics object

A collection of graphics that represent various measurements.

considerations object

What considerations should be taken into account regarding the model's construction, training, and application?

6 nested properties
users string[]

Who are the intended users of the model?

useCases string[]

What are the intended use cases of the model?

technicalLimitations string[]

What are the known technical limitations of the model? E.g. What kind(s) of data should the model be expected not to perform well on? What are the factors that might degrade model performance?

performanceTradeoffs string[]

What are the known tradeoffs in accuracy/performance of the model?

ethicalConsiderations risk[]

What are the ethical (or environmental) risks involved in the application of this model?

fairnessAssessments fairnessAssessment[]

How does the model affect groups at risk of being systematically disadvantaged? What are the harms and benefits to the various affected groups?

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

This object SHOULD be specified for any component of type data and MUST NOT be specified for other component types.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

swid object

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

tagId string required

Maps to the tagId of a SoftwareIdentity.

name string required

Maps to the name of a SoftwareIdentity.

version string

Maps to the version of a SoftwareIdentity.

Default: "0.0"
tagVersion integer

Maps to the tagVersion of a SoftwareIdentity.

Default: 0
patch boolean

Maps to the patch of a SoftwareIdentity.

Default: false
text object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
url string

The URL to the SWID file.

format=iri-reference
attachment object

Specifies the metadata and content for an attachment.

content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
hash object
alg string required
Values: "MD5" "SHA-1" "SHA-256" "SHA-384" "SHA-512" "SHA3-256" "SHA3-384" "SHA3-512" "BLAKE2b-256" "BLAKE2b-384" "BLAKE2b-512" "BLAKE3"
content string required
Examples: "3942447fac867ae5cdb3229b658f4d48"
pattern=^([a-fA-F0-9]{32}|[a-fA-F0-9]{40}|[a-fA-F0-9]{64}|[a-fA-F0-9]{96}|[a-fA-F0-9]{128})$
hash-alg string
hash-content string
Examples:
  • "3942447fac867ae5cdb3229b658f4d48"
license object
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1

A valid SPDX license ID

Examples: "Apache-2.0"
name string

If SPDX does not define the license used, this field may be used to provide the license name

Examples: "Acme Software License"
text object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
url string

The URL to the license file. If specified, a 'license' externalReference should also be specified for completeness

Examples: "https://www.apache.org/licenses/LICENSE-2.0.txt"
format=iri-reference
licensing object

Licensing details describing the licensor/licensee, license type, renewal and expiration dates, and other important metadata

8 nested properties
altIds string[]

License identifiers that may be used to manage licenses and their lifecycle

licensor object

The individual or organization that grants a license to another individual or organization

One of: variant, variant
2 nested properties
organization object
individual object
licensee object

The individual or organization for which a license was granted to

One of: variant, variant
2 nested properties
organization object
individual object
purchaser object

The individual or organization that purchased the license

One of: variant, variant
2 nested properties
organization object
individual object
purchaseOrder string

The purchase order identifier the purchaser sent to a supplier or vendor to authorize a purchase

licenseTypes string[]

The type of license(s) that was granted to the licensee

  • academic = A license that grants use of software solely for the purpose of education or research.
  • appliance = A license covering use of software embedded in a specific piece of hardware.
  • client-access = A Client Access License (CAL) allows client computers to access services provided by server software.
  • concurrent-user = A Concurrent User license (aka floating license) limits the number of licenses for a software application and licenses are shared among a larger number of users.
  • core-points = A license where the core of a computer's processor is assigned a specific number of points.
  • custom-metric = A license for which consumption is measured by non-standard metrics.
  • device = A license that covers a defined number of installations on computers and other types of devices.
  • evaluation = A license that grants permission to install and use software for trial purposes.
  • named-user = A license that grants access to the software to one or more pre-defined users.
  • node-locked = A license that grants access to the software on one or more pre-defined computers or devices.
  • oem = An Original Equipment Manufacturer license that is delivered with hardware, cannot be transferred to other hardware, and is valid for the life of the hardware.
  • perpetual = A license where the software is sold on a one-time basis and the licensee can use a copy of the software indefinitely.
  • processor-points = A license where each installation consumes points per processor.
  • subscription = A license where the licensee pays a fee to use the software or service.
  • user = A license that grants access to the software or service by a specified number of users.
  • other = Another license type.
lastRenewal string

The timestamp indicating when the license was last renewed. For new purchases, this is often the purchase or acquisition date. For non-perpetual licenses or subscriptions, this is the timestamp of when the license was last renewed.

format=date-time
expiration string

The timestamp indicating when the current license expires (if applicable).

format=date-time
properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

licenseChoice array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

commit object

Specifies an individual commit

uid string

A unique identifier of the commit. This may be version control specific. For example, Subversion uses revision numbers whereas git uses commit hashes.

url string

The URL to the commit. This URL will typically point to a commit in a version control system.

format=iri-reference
author object

Specifies an individual commit

3 nested properties
timestamp string

The timestamp in which the action occurred

format=date-time
name string

The name of the individual who performed the action

email string

The email address of the individual who performed the action

format=idn-email
committer object

Specifies an individual commit

3 nested properties
timestamp string

The timestamp in which the action occurred

format=date-time
name string

The name of the individual who performed the action

email string

The email address of the individual who performed the action

format=idn-email
message string

The text description of the contents of the commit

patch object

Specifies an individual patch

type string required

Specifies the purpose for the patch including the resolution of defects, security issues, or new behavior or functionality.

Values: "unofficial" "monkey" "backport" "cherry-pick"
diff object

The patch file (or diff) that show changes. Refer to https://en.wikipedia.org/wiki/Diff

2 nested properties
text object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
url string

Specifies the URL to the diff

format=iri-reference
resolves issue[]

A collection of issues the patch resolves

diff object

The patch file (or diff) that show changes. Refer to https://en.wikipedia.org/wiki/Diff

text object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
url string

Specifies the URL to the diff

format=iri-reference
issue object

An individual issue that has been resolved.

type string required

Specifies the type of issue

Values: "defect" "enhancement" "security"
id string

The identifier of the issue assigned by the source of the issue

name string

The name of the issue

description string

A description of the issue

source object

The source of the issue where it is documented

2 nested properties
name string

The name of the source. For example 'National Vulnerability Database', 'NVD', and 'Apache'

url string

The url of the issue documentation as provided by the source

format=iri-reference
references string[]

A collection of URL's for reference. Multiple URLs are allowed.

Examples: "https://example.com"
identifiableAction object

Specifies an individual commit

timestamp string

The timestamp in which the action occurred

format=date-time
name string

The name of the individual who performed the action

email string

The email address of the individual who performed the action

format=idn-email
externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

dependency object

Defines the direct dependencies of a component or service. Components or services that do not have their own dependencies MUST be declared as empty elements within the graph. Components or services that are not represented in the dependency graph MAY have unknown dependencies. It is RECOMMENDED that implementations assume this to be opaque and not an indicator of a object being dependency-free. It is RECOMMENDED to leverage compositions to indicate unknown dependency graphs.

ref required

Descriptor for an element identified by the attribute 'bom-ref' in the same BOM document. In contrast to bomLinkElementType.

All of: refType string
dependsOn refLinkType[]

The bom-ref identifiers of the components or services that are dependencies of this dependency object.

uniqueItems=true
service object
name string required

The name of the service. This will often be a shortened, single name of the service.

Examples: "ticker-service"
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
provider object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

group string

The grouping name, namespace, or identifier. This will often be a shortened, single name of the company or project that produced the service or domain name. Whitespace and special characters should be avoided.

Examples: "com.acme"
version string

The service version.

Examples: "1.0.0"
description string

Specifies a description for the service

endpoints string[]

The endpoint URIs of the service. Multiple endpoints are allowed.

Examples: "https://example.com/api/v1/ticker"
authenticated boolean

A boolean value indicating if the service requires authentication. A value of true indicates the service requires authentication prior to use. A value of false indicates the service does not require authentication.

x-trust-boundary boolean

A boolean value indicating if use of the service crosses a trust zone or boundary. A value of true indicates that by using the service, a trust boundary is crossed. A value of false indicates that by using the service, a trust boundary is not crossed.

trustZone string

The name of the trust zone the service resides in.

Specifies information about the data including the directional flow of data and the data classification.

licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

services service[]

A list of services included or deployed behind the parent service. This is not a dependency tree. It provides a way to specify a hierarchical representation of service assemblies.

uniqueItems=true
releaseNotes object
11 nested properties
type string required

The software versioning type. It is RECOMMENDED that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

  • major = A major release may contain significant changes or may introduce breaking changes.
  • minor = A minor release, also known as an update, may contain a smaller number of changes than major releases.
  • patch = Patch releases are typically unplanned and may resolve defects or important security issues.
  • pre-release = A pre-release may include alpha, beta, or release candidates and typically have limited support. They provide the ability to preview a release prior to its general availability.
  • internal = Internal releases are not for public consumption and are intended to be used exclusively by the project or manufacturer that produced it.
Examples: "major", "minor", "patch", "pre-release", "internal"
title string

The title of the release.

featuredImage string

The URL to an image that may be prominently displayed with the release note.

format=iri-reference
socialImage string

The URL to an image that may be used in messaging on social media platforms.

format=iri-reference
description string

A short description of the release.

timestamp string

The date and time (timestamp) when the release note was created.

format=date-time
aliases string[]

One or more alternate names the release may be referred to. This may include unofficial terms used by development and marketing teams (e.g. code names).

tags string[]

One or more tags that may aid in search or retrieval of the release note.

resolves issue[]

A collection of issues that have been resolved.

notes note[]

Zero or more release notes containing the locale and content. Multiple note objects may be specified to support release notes in a wide variety of languages.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

serviceData object
flow string required

Specifies the flow direction of the data. Direction is relative to the service. Inbound flow states that data enters the service. Outbound flow states that data leaves the service. Bi-directional states that data flows both ways, and unknown states that the direction is not known.

Values: "inbound" "outbound" "bi-directional" "unknown"
classification string required

Data classification tags data according to its type, sensitivity, and value if altered, stolen, or destroyed.

name string

Name for the defined data

Examples: "Credit card reporting"
description string

Short description of the data content and usage

Examples: "Credit card information being exchanged in between the web app and the database"
governance object
3 nested properties

Data custodians are responsible for the safe custody, transport, and storage of data.

Data stewards are responsible for data content, context, and associated business rules.

Data owners are concerned with risk and appropriate access to data.

source string | bomLinkElementType[]

The URI, URL, or BOM-Link of the components or services the data came in from

destination string | bomLinkElementType[]

The URI, URL, or BOM-Link of the components or services the data is sent to

dataFlowDirection string

Specifies the flow direction of the data. Direction is relative to the service. Inbound flow states that data enters the service. Outbound flow states that data leaves the service. Bi-directional states that data flows both ways, and unknown states that the direction is not known.

componentEvidence object

Provides the ability to document evidence collected through various forms of extraction or analysis.

identity object

Evidence that substantiates the identity of a component.

4 nested properties
field string required

The identity field of the component which the evidence describes.

Values: "group" "name" "version" "purl" "cpe" "swid" "hash"
confidence number

The overall confidence of the evidence from 0 - 1, where 1 is 100% confidence.

min=0max=1
methods object[]

The methods used to extract and/or analyze the evidence.

tools refLinkType | bomLinkElementType[]

The object in the BOM identified by its bom-ref. This is often a component or service, but may be any object type supporting bom-refs. Tools used for analysis should already be defined in the BOM, either in the metadata/tools, components, or formulation.

uniqueItems=true
occurrences object[]

Evidence of individual instances of a component spread across multiple locations.

callstack object

Evidence of the components use through the callstack.

1 nested properties
frames object[]
licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright copyright[]
compositions object
aggregate string required
Default: "not_specified"
Values: "complete" "incomplete" "incomplete_first_party_only" "incomplete_first_party_proprietary_only" "incomplete_first_party_opensource_only" "incomplete_third_party_only" "incomplete_third_party_proprietary_only" "incomplete_third_party_opensource_only" "unknown" "not_specified"
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
assemblies refLinkType | bomLinkElementType[]

The bom-ref identifiers of the components or services being described. Assemblies refer to nested relationships whereby a constituent part may include other constituent parts. References do not cascade to child parts. References are explicit for the specified constituent part only.

uniqueItems=true
dependencies string[]

The bom-ref identifiers of the components or services being described. Dependencies refer to a relationship whereby an independent constituent part requires another independent constituent part. References do not cascade to transitive dependencies. References are explicit for the specified dependency only.

uniqueItems=true
vulnerabilities string[]

The bom-ref identifiers of the vulnerabilities being described.

uniqueItems=true
signature signature

Enveloped signature in JSON Signature Format (JSF).

aggregateType string
property object

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

name string

The name of the property. Duplicate names are allowed, each potentially having a different value.

value string

The value of the property.

localeType string

Defines a syntax for representing two character language code (ISO-639) followed by an optional two character country code. The language code MUST be lower case. If the country code is specified, the country code MUST be upper case. The language code and country code MUST be separated by a minus sign. Examples: en, en-US, fr, fr-CA

releaseType string

The software versioning type. It is RECOMMENDED that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

  • major = A major release may contain significant changes or may introduce breaking changes.
  • minor = A minor release, also known as an update, may contain a smaller number of changes than major releases.
  • patch = Patch releases are typically unplanned and may resolve defects or important security issues.
  • pre-release = A pre-release may include alpha, beta, or release candidates and typically have limited support. They provide the ability to preview a release prior to its general availability.
  • internal = Internal releases are not for public consumption and are intended to be used exclusively by the project or manufacturer that produced it.
Examples:
  • "major"
  • "minor"
  • "patch"
  • "pre-release"
  • "internal"
note object

A note containing the locale and content.

text object required

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
locale string

Defines a syntax for representing two character language code (ISO-639) followed by an optional two character country code. The language code MUST be lower case. If the country code is specified, the country code MUST be upper case. The language code and country code MUST be separated by a minus sign. Examples: en, en-US, fr, fr-CA

pattern=^([a-z]{2})(-[A-Z]{2})?$
releaseNotes object
type string required

The software versioning type. It is RECOMMENDED that the release type use one of 'major', 'minor', 'patch', 'pre-release', or 'internal'. Representing all possible software release types is not practical, so standardizing on the recommended values, whenever possible, is strongly encouraged.

  • major = A major release may contain significant changes or may introduce breaking changes.
  • minor = A minor release, also known as an update, may contain a smaller number of changes than major releases.
  • patch = Patch releases are typically unplanned and may resolve defects or important security issues.
  • pre-release = A pre-release may include alpha, beta, or release candidates and typically have limited support. They provide the ability to preview a release prior to its general availability.
  • internal = Internal releases are not for public consumption and are intended to be used exclusively by the project or manufacturer that produced it.
Examples: "major", "minor", "patch", "pre-release", "internal"
title string

The title of the release.

featuredImage string

The URL to an image that may be prominently displayed with the release note.

format=iri-reference
socialImage string

The URL to an image that may be used in messaging on social media platforms.

format=iri-reference
description string

A short description of the release.

timestamp string

The date and time (timestamp) when the release note was created.

format=date-time
aliases string[]

One or more alternate names the release may be referred to. This may include unofficial terms used by development and marketing teams (e.g. code names).

tags string[]

One or more tags that may aid in search or retrieval of the release note.

resolves issue[]

A collection of issues that have been resolved.

notes note[]

Zero or more release notes containing the locale and content. Multiple note objects may be specified to support release notes in a wide variety of languages.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

advisory object

Title and location where advisory information can be obtained. An advisory is a notification of a threat to a component, service, or system.

url string required

Location where the advisory can be obtained.

format=iri-reference
title string

An optional name of the advisory.

cwe integer

Integer representation of a Common Weaknesses Enumerations (CWE). For example 399 (of https://cwe.mitre.org/data/definitions/399.html)

severity string

Textual representation of the severity of the vulnerability adopted by the analysis method. If the analysis method uses values other than what is provided, the user is expected to translate appropriately.

scoreMethod string
impactAnalysisState string

Declares the current state of an occurrence of a vulnerability, after automated or manual analysis.

  • resolved = the vulnerability has been remediated.
  • resolved_with_pedigree = the vulnerability has been remediated and evidence of the changes are provided in the affected components pedigree containing verifiable commit history and/or diff(s).
  • exploitable = the vulnerability may be directly or indirectly exploitable.
  • in_triage = the vulnerability is being investigated.
  • false_positive = the vulnerability is not specific to the component or service and was falsely identified or associated.
  • not_affected = the component or service is not affected by the vulnerability. Justification should be specified for all not_affected cases.
impactAnalysisJustification string

The rationale of why the impact analysis state was asserted.

  • code_not_present = the code has been removed or tree-shaked.
  • code_not_reachable = the vulnerable code is not invoked at runtime.
  • requires_configuration = exploitability requires a configurable option to be set/unset.
  • requires_dependency = exploitability requires a dependency that is not present.
  • requires_environment = exploitability requires a certain environment which is not present.
  • protected_by_compiler = exploitability requires a compiler flag to be set/unset.
  • protected_at_runtime = exploits are prevented at runtime.
  • protected_at_perimeter = attacks are blocked at physical, logical, or network perimeter.
  • protected_by_mitigating_control = preventative measures have been implemented that reduce the likelihood and/or impact of the vulnerability.
rating object

Defines the severity or risk ratings of a vulnerability.

source object

The source of vulnerability information. This is often the organization that published the vulnerability.

2 nested properties
url string

The url of the vulnerability documentation as provided by the source.

Examples: "https://nvd.nist.gov/vuln/detail/CVE-2021-39182"
name string

The name of the source.

Examples: "NVD", "National Vulnerability Database", "OSS Index", "VulnDB", "GitHub Advisories"
score number

The numerical score of the rating.

severity string

Textual representation of the severity of the vulnerability adopted by the analysis method. If the analysis method uses values other than what is provided, the user is expected to translate appropriately.

Values: "critical" "high" "medium" "low" "info" "none" "unknown"
method string
Values: "CVSSv2" "CVSSv3" "CVSSv31" "CVSSv4" "OWASP" "SSVC" "other"
vector string

Textual representation of the metric values used to score the vulnerability

justification string

An optional reason for rating the vulnerability as it was

vulnerabilitySource object

The source of vulnerability information. This is often the organization that published the vulnerability.

url string

The url of the vulnerability documentation as provided by the source.

Examples: "https://nvd.nist.gov/vuln/detail/CVE-2021-39182"
name string

The name of the source.

Examples: "NVD", "National Vulnerability Database", "OSS Index", "VulnDB", "GitHub Advisories"
vulnerability object

Defines a weakness in a component or service that could be exploited or triggered by a threat source.

bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
id string

The identifier that uniquely identifies the vulnerability.

Examples: "CVE-2021-39182", "GHSA-35m5-8cvj-8783", "SNYK-PYTHON-ENROCRYPT-1912876"
source object

The source of vulnerability information. This is often the organization that published the vulnerability.

2 nested properties
url string

The url of the vulnerability documentation as provided by the source.

Examples: "https://nvd.nist.gov/vuln/detail/CVE-2021-39182"
name string

The name of the source.

Examples: "NVD", "National Vulnerability Database", "OSS Index", "VulnDB", "GitHub Advisories"
references object[]

Zero or more pointers to vulnerabilities that are the equivalent of the vulnerability specified. Often times, the same vulnerability may exist in multiple sources of vulnerability intelligence, but have different identifiers. References provide a way to correlate vulnerabilities across multiple sources of vulnerability intelligence.

ratings rating[]

List of vulnerability ratings

cwes cwe[]

List of Common Weaknesses Enumerations (CWEs) codes that describes this vulnerability. For example 399 (of https://cwe.mitre.org/data/definitions/399.html)

Examples: 399
description string

A description of the vulnerability as provided by the source.

detail string

If available, an in-depth description of the vulnerability as provided by the source organization. Details often include information useful in understanding root cause.

recommendation string

Recommendations of how the vulnerability can be remediated or mitigated.

workaround string

A bypass, usually temporary, of the vulnerability that reduces its likelihood and/or impact. Workarounds often involve changes to configuration or deployments.

proofOfConcept object

Evidence used to reproduce the vulnerability.

3 nested properties
reproductionSteps string

Precise steps to reproduce the vulnerability.

environment string

A description of the environment in which reproduction was possible.

supportingMaterial attachment[]

Supporting material that helps in reproducing or understanding how reproduction is possible. This may include screenshots, payloads, and PoC exploit code.

advisories advisory[]

Published advisories of the vulnerability if provided.

created string

The date and time (timestamp) when the vulnerability record was created in the vulnerability database.

format=date-time
published string

The date and time (timestamp) when the vulnerability record was first published.

format=date-time
updated string

The date and time (timestamp) when the vulnerability record was last updated.

format=date-time
rejected string

The date and time (timestamp) when the vulnerability record was rejected (if applicable).

format=date-time
credits object

Individuals or organizations credited with the discovery of the vulnerability.

2 nested properties
organizations organizationalEntity[]

The organizations credited with vulnerability discovery.

The individuals, not associated with organizations, that are credited with vulnerability discovery.

tools object | tool[]
analysis object

An assessment of the impact and exploitability of the vulnerability.

6 nested properties
state string

Declares the current state of an occurrence of a vulnerability, after automated or manual analysis.

  • resolved = the vulnerability has been remediated.
  • resolved_with_pedigree = the vulnerability has been remediated and evidence of the changes are provided in the affected components pedigree containing verifiable commit history and/or diff(s).
  • exploitable = the vulnerability may be directly or indirectly exploitable.
  • in_triage = the vulnerability is being investigated.
  • false_positive = the vulnerability is not specific to the component or service and was falsely identified or associated.
  • not_affected = the component or service is not affected by the vulnerability. Justification should be specified for all not_affected cases.
Values: "resolved" "resolved_with_pedigree" "exploitable" "in_triage" "false_positive" "not_affected"
justification string

The rationale of why the impact analysis state was asserted.

  • code_not_present = the code has been removed or tree-shaked.
  • code_not_reachable = the vulnerable code is not invoked at runtime.
  • requires_configuration = exploitability requires a configurable option to be set/unset.
  • requires_dependency = exploitability requires a dependency that is not present.
  • requires_environment = exploitability requires a certain environment which is not present.
  • protected_by_compiler = exploitability requires a compiler flag to be set/unset.
  • protected_at_runtime = exploits are prevented at runtime.
  • protected_at_perimeter = attacks are blocked at physical, logical, or network perimeter.
  • protected_by_mitigating_control = preventative measures have been implemented that reduce the likelihood and/or impact of the vulnerability.
Values: "code_not_present" "code_not_reachable" "requires_configuration" "requires_dependency" "requires_environment" "protected_by_compiler" "protected_at_runtime" "protected_at_perimeter" "protected_by_mitigating_control"
response string[]

A response to the vulnerability by the manufacturer, supplier, or project responsible for the affected component or service. More than one response is allowed. Responses are strongly encouraged for vulnerabilities where the analysis state is exploitable.

detail string

Detailed description of the impact including methods used during assessment. If a vulnerability is not exploitable, this field should include specific details on why the component or service is not impacted by this vulnerability.

firstIssued string

The date and time (timestamp) when the analysis was first issued.

format=date-time
lastUpdated string

The date and time (timestamp) when the analysis was last updated.

format=date-time
affects object[]

The components or services that are affected by the vulnerability.

uniqueItems=true
properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

affectedStatus string

The vulnerability status of a given version or range of versions of a product. The statuses 'affected' and 'unaffected' indicate that the version is affected or unaffected by the vulnerability. The status 'unknown' indicates that it is unknown or unspecified whether the given version is affected. There can be many reasons for an 'unknown' status, including that an investigation has not been undertaken or that a vendor has not disclosed the status.

version string

A single version of a component or service.

range string

A version range specified in Package URL Version Range syntax (vers) which is defined at https://github.com/package-url/vers-spec

annotations object

A comment, note, explanation, or similar textual content which provides additional context to the object(s) being annotated.

subjects refLinkType | bomLinkElementType[] required

The object in the BOM identified by its bom-ref. This is often a component or service, but may be any object type supporting bom-refs.

uniqueItems=true
annotator object required

The organization, person, component, or service which created the textual content of the annotation.

One of: variant, variant, variant, variant
4 nested properties
organization object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

individual object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of a contact

Examples: "Contact name"
email string

The email address of the contact.

Examples: "[email protected]"
format=idn-email
phone string

The phone number of the contact.

Examples: "800-555-1212"
component object
27 nested properties
type string required

Specifies the type of component. For software components, classify as application if no more specific appropriate classification is available or cannot be determined for the component. Types include:

Values: "application" "framework" "library" "container" "platform" "operating-system" "device" "device-driver" "firmware" "file" "machine-learning-model" "data"
Examples: "library"
name string required

The name of the component. This will often be a shortened, single name of the component. Examples: commons-lang3 and jquery

Examples: "tomcat-catalina"
mime-type string

The optional mime-type of the component. When used on file components, the mime-type can provide additional context about the kind of file being represented such as an image, font, or executable. Some library or framework components may also have an associated mime-type.

Examples: "image/jpeg"
pattern=^[-+a-z0-9.]+/[-+a-z0-9.]+$
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
supplier object
author string

The person(s) or organization(s) that authored the component

Examples: "Acme Inc"
publisher string

The person(s) or organization(s) that published the component

Examples: "Acme Inc"
group string

The grouping name or identifier. This will often be a shortened, single name of the company or project that produced the component, or the source package or domain name. Whitespace and special characters should be avoided. Examples include: apache, org.apache.commons, and apache.org.

Examples: "com.acme"
version string

The component version. The version should ideally comply with semantic versioning but is not enforced.

Examples: "9.0.14"
description string

Specifies a description for the component

scope string

Specifies the scope of the component. If scope is not specified, 'required' scope SHOULD be assumed by the consumer of the BOM.

Default: "required"
Values: "required" "optional" "excluded"
hashes hash[]
licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
copyright string

A copyright notice informing users of the underlying claims to copyright ownership in a published work.

Examples: "Acme Inc"
cpe string

Specifies a well-formed CPE name that conforms to the CPE 2.2 or 2.3 specification. See [https://nvd.nist.gov/products/cpe](https://nvd.nist.gov/products/cpe)

Examples: "cpe:2.3:a:acme:component_framework:-:*:*:*:*:*:*:*"
purl string

Specifies the package-url (purl). The purl, if specified, MUST be valid and conform to the specification defined at: [https://github.com/package-url/purl-spec](https://github.com/package-url/purl-spec)

Examples: "pkg:maven/com.acme/[email protected]?packaging=jar"
swid object

Specifies metadata and content for ISO-IEC 19770-2 Software Identification (SWID) Tags.

modified boolean

[Deprecated] - DO NOT USE. This will be removed in a future version. Use the pedigree element instead to supply information on exactly how the component was modified. A boolean value indicating if the component has been modified from the original. A value of true indicates the component is a derivative of the original. A value of false indicates the component has not been modified from the original.

pedigree object

Component pedigree is a way to document complex supply chain scenarios where components are created, distributed, modified, redistributed, combined with other components, etc. Pedigree supports viewing this complex chain from the beginning, the end, or anywhere in the middle. It also provides a way to document variants where the exact relation may not be known.

externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

components component[]

A list of software and hardware components included in the parent component. This is not a dependency tree. It provides a way to specify a hierarchical representation of component assemblies, similar to system → subsystem → parts assembly in physical supply chains.

uniqueItems=true
evidence object

Provides the ability to document evidence collected through various forms of extraction or analysis.

releaseNotes object
modelCard object

A model card describes the intended uses of a machine learning model and potential limitations, including biases and ethical considerations. Model cards typically contain the training parameters, which datasets were used to train the model, performance metrics, and other relevant data useful for ML transparency. This object SHOULD be specified for any component of type machine-learning-model and MUST NOT be specified for other component types.

This object SHOULD be specified for any component of type data and MUST NOT be specified for other component types.

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

service object
17 nested properties
name string required

The name of the service. This will often be a shortened, single name of the service.

Examples: "ticker-service"
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
provider object
group string

The grouping name, namespace, or identifier. This will often be a shortened, single name of the company or project that produced the service or domain name. Whitespace and special characters should be avoided.

Examples: "com.acme"
version string

The service version.

Examples: "1.0.0"
description string

Specifies a description for the service

endpoints string[]

The endpoint URIs of the service. Multiple endpoints are allowed.

Examples: "https://example.com/api/v1/ticker"
authenticated boolean

A boolean value indicating if the service requires authentication. A value of true indicates the service requires authentication prior to use. A value of false indicates the service does not require authentication.

x-trust-boundary boolean

A boolean value indicating if use of the service crosses a trust zone or boundary. A value of true indicates that by using the service, a trust boundary is crossed. A value of false indicates that by using the service, a trust boundary is not crossed.

trustZone string

The name of the trust zone the service resides in.

Specifies information about the data including the directional flow of data and the data classification.

licenses array

EITHER (list of SPDX licenses and/or named licenses) OR (tuple of one SPDX License Expression)

One of: Multiple licenses object[], SPDX License Expression array
externalReferences externalReference[]

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

services service[]

A list of services included or deployed behind the parent service. This is not a dependency tree. It provides a way to specify a hierarchical representation of service assemblies.

uniqueItems=true
releaseNotes object
properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

signature signature

Enveloped signature in JSON Signature Format (JSF).

timestamp string required

The date and time (timestamp) when the annotation was created.

format=date-time
text string required

The textual content of the annotation.

bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
signature signature

Enveloped signature in JSON Signature Format (JSF).

modelCard object

A model card describes the intended uses of a machine learning model and potential limitations, including biases and ethical considerations. Model cards typically contain the training parameters, which datasets were used to train the model, performance metrics, and other relevant data useful for ML transparency. This object SHOULD be specified for any component of type machine-learning-model and MUST NOT be specified for other component types.

bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
modelParameters object

Hyper-parameters for construction of the model.

7 nested properties
approach object

The overall approach to learning used by the model for problem solving.

1 nested properties
type string

Learning types describing the learning problem or hybrid learning problem.

Values: "supervised" "unsupervised" "reinforcement-learning" "semi-supervised" "self-supervised"
task string

Directly influences the input and/or output. Examples include classification, regression, clustering, etc.

architectureFamily string

The model architecture family such as transformer network, convolutional neural network, residual neural network, LSTM neural network, etc.

modelArchitecture string

The specific architecture of the model such as GPT-1, ResNet-50, YOLOv3, etc.

datasets componentData | object[]

The datasets used to train and evaluate the model.

The input format(s) of the model

The output format(s) from the model

quantitativeAnalysis object

A quantitative analysis of the model

2 nested properties
performanceMetrics performanceMetric[]

The model performance metrics being reported. Examples may include accuracy, F1 score, precision, top-3 error rates, MSC, etc.

graphics object

A collection of graphics that represent various measurements.

2 nested properties
description string

A description of this collection of graphics.

collection graphic[]

A collection of graphics.

considerations object

What considerations should be taken into account regarding the model's construction, training, and application?

6 nested properties
users string[]

Who are the intended users of the model?

useCases string[]

What are the intended use cases of the model?

technicalLimitations string[]

What are the known technical limitations of the model? E.g. What kind(s) of data should the model be expected not to perform well on? What are the factors that might degrade model performance?

performanceTradeoffs string[]

What are the known tradeoffs in accuracy/performance of the model?

ethicalConsiderations risk[]

What are the ethical (or environmental) risks involved in the application of this model?

fairnessAssessments fairnessAssessment[]

How does the model affect groups at risk of being systematically disadvantaged? What are the harms and benefits to the various affected groups?

properties property[]

Provides the ability to document properties in a name-value store. This provides flexibility to include data not officially supported in the standard without having to use additional namespaces or create extensions. Unlike key-value stores, properties support duplicate names, each potentially having different values. Property names of interest to the general public are encouraged to be registered in the CycloneDX Property Taxonomy. Formal registration is OPTIONAL.

inputOutputMLParameters object
format string

The data format for input/output to the model. Example formats include string, image, time-series

componentData object
type string required

The general theme or subject matter of the data being specified.

  • source-code = Any type of code, code snippet, or data-as-code.
  • configuration = Parameters or settings that may be used by other components.
  • dataset = A collection of data.
  • definition = Data that can be used to create new instances of what the definition defines.
  • other = Any other type of data that does not fit into existing definitions.
Values: "source-code" "configuration" "dataset" "definition" "other"
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the dataset.

contents object

The contents or references to the contents of the data being described.

3 nested properties
attachment object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
url string

The URL to where the data can be retrieved.

format=iri-reference
properties property[]

Provides the ability to document name-value parameters used for configuration.

classification string

Data classification tags data according to its type, sensitivity, and value if altered, stolen, or destroyed.

sensitiveData string[]

A description of any sensitive data in a dataset.

graphics object

A collection of graphics that represent various measurements.

2 nested properties
description string

A description of this collection of graphics.

collection graphic[]

A collection of graphics.

description string

A description of the dataset. Can describe size of dataset, whether it's used for source code, training, testing, or validation, etc.

governance object
3 nested properties

Data custodians are responsible for the safe custody, transport, and storage of data.

Data stewards are responsible for data content, context, and associated business rules.

Data owners are concerned with risk and appropriate access to data.

dataGovernance object

Data custodians are responsible for the safe custody, transport, and storage of data.

Data stewards are responsible for data content, context, and associated business rules.

Data owners are concerned with risk and appropriate access to data.

dataGovernanceResponsibleParty object
organization object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of the organization

Examples: "Example Inc."
url string[]

The URL of the organization. Multiple URLs are allowed.

Examples: "https://example.com"

A contact at the organization. Multiple contacts are allowed.

contact object
4 nested properties
bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
name string

The name of a contact

Examples: "Contact name"
email string

The email address of the contact.

Examples: "[email protected]"
format=idn-email
phone string

The phone number of the contact.

Examples: "800-555-1212"
graphicsCollection object

A collection of graphics that represent various measurements.

description string

A description of this collection of graphics.

collection graphic[]

A collection of graphics.

graphic object
name string

The name of the graphic.

image object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
performanceMetric object
type string

The type of performance metric.

value string

The value of the performance metric.

slice string

The name of the slice this metric was computed on. By default, assume this metric is not sliced.

confidenceInterval object

The confidence interval of the metric.

2 nested properties
lowerBound string

The lower bound of the confidence interval.

upperBound string

The upper bound of the confidence interval.

risk object
name string

The name of the risk.

mitigationStrategy string

Strategy used to address this risk.

fairnessAssessment object

Information about the benefits and harms of the model to an identified at risk group.

groupAtRisk string

The groups or individuals at risk of being systematically disadvantaged by the model.

benefits string

Expected benefits to the identified groups.

harms string

Expected harms to the identified groups.

mitigationStrategy string

With respect to the benefits and harms outlined, please describe any mitigation strategy implemented.

dataClassification string

Data classification tags data according to its type, sensitivity, and value if altered, stolen, or destroyed.

formula object

Describes workflows and resources that captures rules and other aspects of how the associated BOM component or service was formed.

bom-ref string

Identifier for referable and therefore interlink-able elements.

minLength=1
components component[]

Transient components that are used in tasks that constitute one or more of this formula's workflows

uniqueItems=true
services service[]

Transient services that are used in tasks that constitute one or more of this formula's workflows

uniqueItems=true
workflows workflow[]

List of workflows that can be declared to accomplish specific orchestrated goals and independently triggered.

uniqueItems=true
properties property[]
workflow object

A specialized orchestration task.

bom-ref string required

Identifier for referable and therefore interlink-able elements.

minLength=1
uid string required

The unique identifier for the resource instance within its deployment context.

taskTypes taskType[] required

Indicates the types of activities performed by the set of workflow tasks.

name string

The name of the resource instance.

description string

A description of the resource instance.

resourceReferences resourceReferenceChoice[]

References to component or service resources that are used to realize the resource instance.

uniqueItems=true
tasks task[]

The tasks that comprise the workflow.

uniqueItems=true
taskDependencies dependency[]

The graph of dependencies between tasks within the workflow.

uniqueItems=true
trigger object

Represents a resource that can conditionally activate (or fire) tasks based upon associated events and their data.

12 nested properties
bom-ref string required

Identifier for referable and therefore interlink-able elements.

minLength=1
uid string required

The unique identifier for the resource instance within its deployment context.

type string required

The source type of event which caused the trigger to fire.

Values: "manual" "api" "webhook" "scheduled"
name string

The name of the resource instance.

description string

A description of the resource instance.

resourceReferences resourceReferenceChoice[]

References to component or service resources that are used to realize the resource instance.

uniqueItems=true
event object

Represents something that happened that may trigger a response.

7 nested properties
uid string

The unique identifier of the event.

description string

A description of the event.

timeReceived string

The date and time (timestamp) when the event was received.

format=date-time
data object

Specifies the metadata and content for an attachment.

source object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
target object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
properties property[]
conditions condition[]
uniqueItems=true
timeActivated string

The date and time (timestamp) when the trigger was activated.

format=date-time
inputs inputType[]

Represents resources and data brought into a task at runtime by executor or task commands

Examples: "a `configuration` file which was declared as a local `component` or `externalReference`"
uniqueItems=true
outputs outputType[]

Represents resources and data output from a task at runtime by executor or task commands

Examples: "a log file or metrics data produced by the task"
uniqueItems=true
properties property[]
steps step[]

The sequence of steps for the task.

uniqueItems=true
inputs inputType[]

Represents resources and data brought into a task at runtime by executor or task commands

Examples: "a `configuration` file which was declared as a local `component` or `externalReference`"
uniqueItems=true
outputs outputType[]

Represents resources and data output from a task at runtime by executor or task commands

Examples: "a log file or metrics data produced by the task"
uniqueItems=true
timeStart string

The date and time (timestamp) when the task started.

format=date-time
timeEnd string

The date and time (timestamp) when the task ended.

format=date-time
workspaces workspace[]

A set of named filesystem or data resource shareable by workflow tasks.

uniqueItems=true
runtimeTopology dependency[]

A graph of the component runtime topology for workflow's instance.

uniqueItems=true
properties property[]
task object

Describes the inputs, sequence of steps and resources used to accomplish a task and its output.

bom-ref string required

Identifier for referable and therefore interlink-able elements.

minLength=1
uid string required

The unique identifier for the resource instance within its deployment context.

taskTypes taskType[] required

Indicates the types of activities performed by the set of workflow tasks.

name string

The name of the resource instance.

description string

A description of the resource instance.

resourceReferences resourceReferenceChoice[]

References to component or service resources that are used to realize the resource instance.

uniqueItems=true
trigger object

Represents a resource that can conditionally activate (or fire) tasks based upon associated events and their data.

12 nested properties
bom-ref string required

Identifier for referable and therefore interlink-able elements.

minLength=1
uid string required

The unique identifier for the resource instance within its deployment context.

type string required

The source type of event which caused the trigger to fire.

Values: "manual" "api" "webhook" "scheduled"
name string

The name of the resource instance.

description string

A description of the resource instance.

resourceReferences resourceReferenceChoice[]

References to component or service resources that are used to realize the resource instance.

uniqueItems=true
event object

Represents something that happened that may trigger a response.

7 nested properties
uid string

The unique identifier of the event.

description string

A description of the event.

timeReceived string

The date and time (timestamp) when the event was received.

format=date-time
data object

Specifies the metadata and content for an attachment.

source object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
target object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
properties property[]
conditions condition[]
uniqueItems=true
timeActivated string

The date and time (timestamp) when the trigger was activated.

format=date-time
inputs inputType[]

Represents resources and data brought into a task at runtime by executor or task commands

Examples: "a `configuration` file which was declared as a local `component` or `externalReference`"
uniqueItems=true
outputs outputType[]

Represents resources and data output from a task at runtime by executor or task commands

Examples: "a log file or metrics data produced by the task"
uniqueItems=true
properties property[]
steps step[]

The sequence of steps for the task.

uniqueItems=true
inputs inputType[]

Represents resources and data brought into a task at runtime by executor or task commands

Examples: "a `configuration` file which was declared as a local `component` or `externalReference`"
uniqueItems=true
outputs outputType[]

Represents resources and data output from a task at runtime by executor or task commands

Examples: "a log file or metrics data produced by the task"
uniqueItems=true
timeStart string

The date and time (timestamp) when the task started.

format=date-time
timeEnd string

The date and time (timestamp) when the task ended.

format=date-time
workspaces workspace[]

A set of named filesystem or data resource shareable by workflow tasks.

uniqueItems=true
runtimeTopology dependency[]

A graph of the component runtime topology for task's instance.

uniqueItems=true
properties property[]
step object

Executes specific commands or tools in order to accomplish its owning task as part of a sequence.

name string

A name for the step.

description string

A description of the step.

commands command[]

Ordered list of commands or directives for the step

properties property[]
command object
executed string

A text representation of the executed command.

properties property[]
workspace object

A named filesystem or data resource shareable by workflow tasks.

bom-ref string required

Identifier for referable and therefore interlink-able elements.

minLength=1
uid string required

The unique identifier for the resource instance within its deployment context.

name string

The name of the resource instance.

aliases string[]

The names for the workspace as referenced by other workflow tasks. Effectively, a name mapping so other tasks can use their own local name in their steps.

description string

A description of the resource instance.

resourceReferences resourceReferenceChoice[]

References to component or service resources that are used to realize the resource instance.

uniqueItems=true
accessMode string

Describes the read-write access control for the workspace relative to the owning resource instance.

Values: "read-only" "read-write" "read-write-once" "write-once" "write-only"
mountPath string

A path to a location on disk where the workspace will be available to the associated task's steps.

managedDataType string

The name of a domain-specific data type the workspace represents.

Examples: "ConfigMap", "Secret"
volumeRequest string

Identifies the reference to the request for a specific volume type and parameters.

Examples: "a kubernetes Persistent Volume Claim (PVC) name"
volume object

An identifiable, logical unit of data storage tied to a physical device.

8 nested properties
uid string

The unique identifier for the volume instance within its deployment context.

name string

The name of the volume instance

mode string

The mode for the volume instance.

Default: "filesystem"
Values: "filesystem" "block"
path string

The underlying path created from the actual volume.

sizeAllocated string

The allocated size of the volume accessible to the associated workspace. This should include the scalar size as well as IEC standard unit in either decimal or binary form.

Examples: "10GB", "2Ti", "1Pi"
persistent boolean

Indicates if the volume persists beyond the life of the resource it is associated with.

remote boolean

Indicates if the volume is remotely (i.e., network) attached.

properties property[]
properties property[]
volume object

An identifiable, logical unit of data storage tied to a physical device.

uid string

The unique identifier for the volume instance within its deployment context.

name string

The name of the volume instance

mode string

The mode for the volume instance.

Default: "filesystem"
Values: "filesystem" "block"
path string

The underlying path created from the actual volume.

sizeAllocated string

The allocated size of the volume accessible to the associated workspace. This should include the scalar size as well as IEC standard unit in either decimal or binary form.

Examples: "10GB", "2Ti", "1Pi"
persistent boolean

Indicates if the volume persists beyond the life of the resource it is associated with.

remote boolean

Indicates if the volume is remotely (i.e., network) attached.

properties property[]
trigger object

Represents a resource that can conditionally activate (or fire) tasks based upon associated events and their data.

bom-ref string required

Identifier for referable and therefore interlink-able elements.

minLength=1
uid string required

The unique identifier for the resource instance within its deployment context.

type string required

The source type of event which caused the trigger to fire.

Values: "manual" "api" "webhook" "scheduled"
name string

The name of the resource instance.

description string

A description of the resource instance.

resourceReferences resourceReferenceChoice[]

References to component or service resources that are used to realize the resource instance.

uniqueItems=true
event object

Represents something that happened that may trigger a response.

7 nested properties
uid string

The unique identifier of the event.

description string

A description of the event.

timeReceived string

The date and time (timestamp) when the event was received.

format=date-time
data object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
source object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

target object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

properties property[]
conditions condition[]
uniqueItems=true
timeActivated string

The date and time (timestamp) when the trigger was activated.

format=date-time
inputs inputType[]

Represents resources and data brought into a task at runtime by executor or task commands

Examples: "a `configuration` file which was declared as a local `component` or `externalReference`"
uniqueItems=true
outputs outputType[]

Represents resources and data output from a task at runtime by executor or task commands

Examples: "a log file or metrics data produced by the task"
uniqueItems=true
properties property[]
event object

Represents something that happened that may trigger a response.

uid string

The unique identifier of the event.

description string

A description of the event.

timeReceived string

The date and time (timestamp) when the event was received.

format=date-time
data object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
source object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

target object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

properties property[]
inputType object

Type that represents various input data types and formats.

source object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

target object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

resource object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

parameters parameter[]

Inputs that have the form of parameters with names and values.

uniqueItems=true
environmentVars property | string[]

Inputs that have the form of parameters with names and values.

uniqueItems=true
data object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
properties property[]
outputType object
type string

Describes the type of data output.

Values: "artifact" "attestation" "log" "evidence" "metrics" "other"
source object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

target object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

resource object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

One of: variant, variant
2 nested properties

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

data object

Specifies the metadata and content for an attachment.

3 nested properties
content string required

The attachment data. Proactive controls such as input validation and sanitization should be employed to prevent misuse of attachment text.

contentType string

Specifies the content type of the text. Defaults to text/plain if not specified.

Default: "text/plain"
encoding string

Specifies the optional encoding the text is represented in.

Values: "base64"
environmentVars property | string[]

Outputs that have the form of environment variables.

uniqueItems=true
properties property[]
resourceReferenceChoice object

A reference to a locally defined resource (e.g., a bom-ref) or an externally accessible resource.

References an object by its bom-ref attribute

externalReference object

External references provide a way to document systems, sites, and information that may be relevant, but are not included with the BOM. They may also establish specific relationships within or external to the BOM.

4 nested properties
url string | bomLink required

The URI (URL or URN) to the external reference. External references are URIs and therefore can accept any URL scheme including https (RFC-7230), mailto (RFC-2368), tel (RFC-3966), and dns (RFC-4501). External references may also include formally registered URNs such as CycloneDX BOM-Link to reference CycloneDX BOMs or any object within a BOM. BOM-Link transforms applicable external references into relationships that can be expressed in a BOM or across BOMs.

type string required

Specifies the type of external reference.

  • vcs = Version Control System
  • issue-tracker = Issue or defect tracking system, or an Application Lifecycle Management (ALM) system
  • website = Website
  • advisories = Security advisories
  • bom = Bill of Materials (SBOM, OBOM, HBOM, SaaSBOM, etc)
  • mailing-list = Mailing list or discussion group
  • social = Social media account
  • chat = Real-time chat platform
  • documentation = Documentation, guides, or how-to instructions
  • support = Community or commercial support
  • distribution = Direct or repository download location
  • distribution-intake = The location where a component was published to. This is often the same as "distribution" but may also include specialized publishing processes that act as an intermediary
  • license = The URL to the license file. If a license URL has been defined in the license node, it should also be defined as an external reference for completeness
  • build-meta = Build-system specific meta file (i.e. pom.xml, package.json, .nuspec, etc)
  • build-system = URL to an automated build system
  • release-notes = URL to release notes
  • security-contact = Specifies a way to contact the maintainer, supplier, or provider in the event of a security incident. Common URIs include links to a disclosure procedure, a mailto (RFC-2368) that specifies an email address, a tel (RFC-3966) that specifies a phone number, or dns (RFC-4501) that specifies the records containing DNS Security TXT
  • model-card = A model card describes the intended uses of a machine learning model, potential limitations, biases, ethical considerations, training parameters, datasets used to train the model, performance metrics, and other relevant data useful for ML transparency
  • log = A record of events that occurred in a computer system or application, such as problems, errors, or information on current operations
  • configuration = Parameters or settings that may be used by other components or services
  • evidence = Information used to substantiate a claim
  • formulation = Describes how a component or service was manufactured or deployed
  • attestation = Human or machine-readable statements containing facts, evidence, or testimony
  • threat-model = An enumeration of identified weaknesses, threats, and countermeasures, dataflow diagram (DFD), attack tree, and other supporting documentation in human-readable or machine-readable format
  • adversary-model = The defined assumptions, goals, and capabilities of an adversary.
  • risk-assessment = Identifies and analyzes the potential of future events that may negatively impact individuals, assets, and/or the environment. Risk assessments may also include judgments on the tolerability of each risk.
  • vulnerability-assertion = A Vulnerability Disclosure Report (VDR) which asserts the known and previously unknown vulnerabilities that affect a component, service, or product including the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on a component, service, or product.
  • exploitability-statement = A Vulnerability Exploitability eXchange (VEX) which asserts the known vulnerabilities that do not affect a product, product family, or organization, and optionally the ones that do. The VEX should include the analysis and findings describing the impact (or lack of impact) that the reported vulnerability has on the product, product family, or organization.
  • pentest-report = Results from an authorized simulated cyberattack on a component or service, otherwise known as a penetration test
  • static-analysis-report = SARIF or proprietary machine or human-readable report for which static analysis has identified code quality, security, and other potential issues with the source code
  • dynamic-analysis-report = Dynamic analysis report that has identified issues such as vulnerabilities and misconfigurations
  • runtime-analysis-report = Report generated by analyzing the call stack of a running application
  • component-analysis-report = Report generated by Software Composition Analysis (SCA), container analysis, or other forms of component analysis
  • maturity-report = Report containing a formal assessment of an organization, business unit, or team against a maturity model
  • certification-report = Industry, regulatory, or other certification from an accredited (if applicable) certification body
  • quality-metrics = Report or system in which quality metrics can be obtained
  • codified-infrastructure = Code or configuration that defines and provisions virtualized infrastructure, commonly referred to as Infrastructure as Code (IaC)
  • poam = Plans of Action and Milestones (POAM) compliment an "attestation" external reference. POAM is defined by NIST as a "document that identifies tasks needing to be accomplished. It details resources required to accomplish the elements of the plan, any milestones in meeting the tasks and scheduled completion dates for the milestones".
  • other = Use this if no other types accurately describe the purpose of the external reference
Values: "vcs" "issue-tracker" "website" "advisories" "bom" "mailing-list" "social" "chat" "documentation" "support" "distribution" "distribution-intake" "license" "build-meta" "build-system" "release-notes" "security-contact" "model-card" "log" "configuration" "evidence" "formulation" "attestation" "threat-model" "adversary-model" "risk-assessment" "vulnerability-assertion" "exploitability-statement" "pentest-report" "static-analysis-report" "dynamic-analysis-report" "runtime-analysis-report" "component-analysis-report" "maturity-report" "certification-report" "codified-infrastructure" "quality-metrics" "poam" "other"
comment string

An optional comment describing the external reference

hashes hash[]

The hashes of the external reference (if applicable).

condition object

A condition that was used to determine a trigger should be activated.

description string

Describes the set of conditions which cause the trigger to activate.

expression string

The logical expression that was evaluated that determined the trigger should be fired.

properties property[]
taskType string
parameter object

A representation of a functional parameter.

name string

The name of the parameter.

value string

The value of the parameter.

dataType string

The data type of the parameter.

signature signature

Enveloped signature in JSON Signature Format (JSF).