Why SBOM Is Critical for Modern Software Security and How to Choose Between SPDX and CycloneDX

The article explains what a Software Bill of Materials (SBOM) is, why it has become a strategic security requirement, compares the leading SPDX and CycloneDX standards, examines China's emerging DSDX format, and offers practical guidance on selecting the right SBOM format and tools for various compliance and risk‑management scenarios.

Continuous Delivery 2.0
Continuous Delivery 2.0
Continuous Delivery 2.0
Why SBOM Is Critical for Modern Software Security and How to Choose Between SPDX and CycloneDX
Software Bill of Materials (SBOM)

is a structured, machine‑readable inventory of every component, library, framework, and dependency that makes up an application, essentially acting as a software "ingredients list" that brings unprecedented transparency to complex supply chains.

Why SBOM Is a Strategic Must‑Have

Precise vulnerability management : When a new vulnerability is disclosed, a complete SBOM lets organizations instantly identify all affected applications and respond quickly.

License‑compliance assurance : SBOM records full licensing information for each open‑source component, helping avoid legal and compliance risks.

Comprehensive risk control : Knowing the origin and composition of software enables accurate assessment of outdated, untrusted, or vulnerable components.

Transparency and trust building : Providing customers and partners with an SBOM demonstrates a commitment to supply‑chain security and fosters long‑term trust.

Audit and due‑diligence simplification : In mergers, acquisitions, or regulatory audits, an SBOM offers a clear, traceable list of software assets and associated risks, dramatically improving audit efficiency.

International Standards: SPDX vs. CycloneDX

Both SPDX and CycloneDX dominate the SBOM landscape, but they differ in authority, adoption, and focus.

Authority : SPDX is an ISO/IEC 5962 international standard (adopted in 2021), making it the formal choice for government contracts and legal evidence.

Adoption & Modernity : CycloneDX is gaining faster traction in security tooling and DevSecOps because it is lightweight and security‑centric.

Use‑case guidance:

Legal/compliance scenarios – prefer SPDX.

CI/CD pipelines, vulnerability scanning (e.g., Trivy, Grype) – default to CycloneDX.

Both formats are accepted by the U.S. Executive Order 14028, and most tools (e.g., Syft, Microsoft SBOM Tool, Trivy) can output either.

China’s Standards Landscape: International Compatibility and Domestic Innovation

China widely adopts SPDX and CycloneDX in open‑source communities and overseas projects, while also developing its own national standard DSDX (Digital Supply Chain Data Exchange) under the guidance of the China Academy of Information and Communications Technology (CAICT) and the TC260 committee.

International coexistence : Enterprises mix formats based on scenario – CycloneDX for security tooling, SPDX for compliance audits.

Domestic push : DSDX aims to combine the strengths of both formats and add fields specific to Chinese regulatory and supply‑chain contexts; it is being promoted in finance, telecom, and government projects.

Key Chinese initiatives:

OpenHarmony supports SPDX 2.2 JSON for license compliance.

openEuler relies on SPDX for package metadata.

National draft standard "Software Bill of Materials Data Format" (TC260) seeks a unified SBOM exchange format to avoid reliance on a single foreign standard.

Choosing the Right SBOM Strategy

If you focus on open‑source OS or overseas compliance (e.g., HarmonyOS, automotive export) – choose SPDX.

If you run enterprise security operations or DevSecOps pipelines – choose CycloneDX.

If you work on state‑owned, financial, or government projects – consider DSDX or the upcoming national standard.

In practice, many teams generate both formats and let downstream consumers pick the one they need (e.g., Dependency‑Track prefers CycloneDX, compliance auditors prefer SPDX).

From Best Practice to Mandatory Requirement

SBOM adoption is moving from optional best practice to regulatory mandate, driven by government policies (U.S. Executive Order on Improving the Nation’s Cybersecurity, EU Cyber Resilience Act) and a growing awareness of supply‑chain risk.

Adoption rates are rising, especially in critical infrastructure.

Regulatory drivers force organizations to produce SBOMs for software releases.

Mature standards (SPDX, CycloneDX) provide a common language for component data.

Tool ecosystems (generators, scanners, CI/CD integrations) are expanding, though challenges remain in scaling SBOM management.

Maturity models from bodies such as CISA help organizations roadmap their SBOM journey.

Top 10 SBOM Generation and Management Tools

Syft

: Open‑source CLI from Anchore that creates SBOMs from container images and file systems. CycloneDX Generators: Official and community tools for producing CycloneDX‑format SBOMs across ecosystems. SPDX SBOM Generator: Supports multiple package managers and languages to create SPDX‑compliant SBOMs. Fossa: Commercial platform offering full SBOM management, license compliance, and vulnerability scanning. Trivy: Aqua Security’s open‑source scanner that can generate SBOMs while scanning containers, filesystems, and Git repos.

Microsoft SBOM Tool: Open‑source, cross‑platform generator for SPDX‑compatible SBOMs, designed for large, complex projects. Tern: Open‑source tool that analyzes container images to produce detailed SBOMs. Jit: DevSecOps orchestration platform that auto‑generates SBOMs in CI/CD pipelines and integrates with security tools.

Sonatype Nexus Lifecycle: Commercial SCA solution with robust SBOM generation and governance features. JFrog Xray: Universal component analysis tool integrated with Artifactory, providing deep visibility and SBOM creation.

关注我,每天收获一个新技能!
关注我,每天收获一个新技能!
open-sourcesoftware securitycompliancesoftware supply chainsbomCycloneDXSPDX
Continuous Delivery 2.0
Written by

Continuous Delivery 2.0

Tech and case studies on organizational management, team management, and engineering efficiency

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.