{"id":4315,"date":"2025-10-23T09:48:06","date_gmt":"2025-10-23T09:48:06","guid":{"rendered":"https:\/\/hkm-consulting.de\/?page_id=4315"},"modified":"2025-10-23T13:19:02","modified_gmt":"2025-10-23T13:19:02","slug":"extended_bill_of_materials","status":"publish","type":"page","link":"https:\/\/hkm-consulting.de\/en\/extended_bill_of_materials\/","title":{"rendered":"Extended Bill of Materials (XBOM &#8211; Transparency across the Supply Chain)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h3>Transparency across the Supply Chain &#8211; Extended Bill of Materials (HBOM &amp; SBOM)<\/h3>\n<p data-start=\"438\" data-end=\"647\">The term <strong data-start=\"447\" data-end=\"455\">XBOM<\/strong> (\u201cExtended Bill of Materials\u201d) describes an advanced approach for the systematic recording and documentation of all <strong data-start=\"572\" data-end=\"584\">software<\/strong> and <strong data-start=\"589\" data-end=\"601\">hardware<\/strong> components used within a product or system.<\/p>\n<p data-start=\"649\" data-end=\"872\">It combines the established concepts of the <strong data-start=\"693\" data-end=\"730\">Software Bill of Materials (SBOM)<\/strong> and the <strong data-start=\"739\" data-end=\"776\">Hardware Bill of Materials (HBOM)<\/strong>, addressing the increasing regulatory and cybersecurity requirements within the European Union.<\/p>\n<p data-start=\"874\" data-end=\"1270\">XBOM serves as a key instrument for ensuring transparency across both digital and physical components.<br data-start=\"976\" data-end=\"979\" \/>With the growing relevance of the <strong data-start=\"1013\" data-end=\"1032\">NIS-2 Directive<\/strong>, the <strong data-start=\"1038\" data-end=\"1068\">Cyber Resilience Act (CRA)<\/strong>, and the <strong data-start=\"1078\" data-end=\"1098\">Supply Chain Act<\/strong>, traceable documentation of all components is becoming a mandatory element \u2014 not only for manufacturers, but also for system integrators, operators, and service providers.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong data-start=\"1281\" data-end=\"1315\">Requirements for Companies<\/strong><\/h3>\n<p data-start=\"1317\" data-end=\"1590\">Organizations face the challenge of fully documenting the origin, security, and maintainability of all deployed components.<br data-start=\"1440\" data-end=\"1443\" \/>Introducing an XBOM structure supports compliance with regulatory obligations while enabling early identification of risks within the supply chain.<\/p>\n<p data-start=\"1592\" data-end=\"1613\"><strong data-start=\"1592\" data-end=\"1613\">Key Requirements:<\/strong><\/p>\n<ul data-start=\"1615\" data-end=\"2363\">\n<li data-start=\"1615\" data-end=\"1770\">\n<p data-start=\"1617\" data-end=\"1770\"><strong data-start=\"1617\" data-end=\"1644\">Component Transparency:<\/strong><br data-start=\"1644\" data-end=\"1647\" \/>All hardware and software components must be identifiable \u2014 including version, origin, manufacturer, and security status.<\/p>\n<\/li>\n<li data-start=\"1772\" data-end=\"1906\">\n<p data-start=\"1774\" data-end=\"1906\"><strong data-start=\"1774\" data-end=\"1796\">Security Evidence:<\/strong><br data-start=\"1796\" data-end=\"1799\" \/>Each component requires documented evidence of security testing, certification, or known vulnerabilities.<\/p>\n<\/li>\n<li data-start=\"1908\" data-end=\"2045\">\n<p data-start=\"1910\" data-end=\"2045\"><strong data-start=\"1910\" data-end=\"1935\">Lifecycle Management:<\/strong><br data-start=\"1935\" data-end=\"1938\" \/>The XBOM must be continuously maintained and updated to reflect product changes throughout its lifecycle.<\/p>\n<\/li>\n<li data-start=\"2047\" data-end=\"2195\">\n<p data-start=\"2049\" data-end=\"2195\"><strong data-start=\"2049\" data-end=\"2081\">Supply Chain Responsibility:<\/strong><br data-start=\"2081\" data-end=\"2084\" \/>Organizations must ensure that suppliers also provide transparent documentation and report any modifications.<\/p>\n<\/li>\n<li data-start=\"2197\" data-end=\"2363\">\n<p data-start=\"2199\" data-end=\"2363\"><strong data-start=\"2199\" data-end=\"2232\">Data Format and Traceability:<\/strong><br data-start=\"2232\" data-end=\"2235\" \/>The use of internationally recognized formats such as <strong data-start=\"2291\" data-end=\"2319\">SPDX (ISO\/IEC 5962:2021)<\/strong> or <strong data-start=\"2323\" data-end=\"2347\">CycloneDX (ECMA-424)<\/strong> is recommended.<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Necessary Steps for Implementation<\/h3>\n<p data-start=\"2421\" data-end=\"2708\">Implementing an XBOM structure requires strategic planning, clear responsibilities, and integration into existing management systems (e.g., Quality Management, Information Security Management, and IT Service Management). A practical implementation roadmap includes the following steps:<\/p>\n<ol data-start=\"2710\" data-end=\"3637\">\n<li data-start=\"2710\" data-end=\"2850\">\n<p data-start=\"2713\" data-end=\"2850\"><strong data-start=\"2713\" data-end=\"2741\">Inventory and Assessment<\/strong><br data-start=\"2741\" data-end=\"2744\" \/>Identify existing software and hardware inventories (e.g., CMDB, asset management, license management).<\/p>\n<\/li>\n<li data-start=\"2852\" data-end=\"2980\">\n<p data-start=\"2855\" data-end=\"2980\"><strong data-start=\"2855\" data-end=\"2875\">Data Structuring<\/strong><br data-start=\"2875\" data-end=\"2878\" \/>Map components to products, systems, or services, and identify versions, dependencies, and origins.<\/p>\n<\/li>\n<li data-start=\"2982\" data-end=\"3120\">\n<p data-start=\"2985\" data-end=\"3120\"><strong data-start=\"2985\" data-end=\"3006\">Format Definition<\/strong><br data-start=\"3006\" data-end=\"3009\" \/>Select the appropriate exchange formats (SPDX, CycloneDX) and define the required data depth and field sets.<\/p>\n<\/li>\n<li data-start=\"3122\" data-end=\"3245\">\n<p data-start=\"3125\" data-end=\"3245\"><strong data-start=\"3125\" data-end=\"3148\">Process Integration<\/strong><br data-start=\"3148\" data-end=\"3151\" \/>Embed XBOM creation into development, procurement, and change\/release management processes.<\/p>\n<\/li>\n<li data-start=\"3247\" data-end=\"3477\">\n<p data-start=\"3250\" data-end=\"3477\"><strong data-start=\"3250\" data-end=\"3280\">Automation and Maintenance<\/strong><br data-start=\"3280\" data-end=\"3283\" \/>Utilize tools or collectors to automatically record components and version data.<br data-start=\"3366\" data-end=\"3369\" \/>Within the <strong data-start=\"3383\" data-end=\"3400\">HKM Framework<\/strong>, dedicated <strong data-start=\"3412\" data-end=\"3426\">connectors<\/strong> and <strong data-start=\"3431\" data-end=\"3445\">collectors<\/strong> are available for this purpose.<\/p>\n<\/li>\n<li data-start=\"3479\" data-end=\"3637\">\n<p data-start=\"3482\" data-end=\"3637\"><strong data-start=\"3482\" data-end=\"3522\">Verification and Compliance Evidence<\/strong><br data-start=\"3522\" data-end=\"3525\" \/>Conduct regular reviews of XBOM data for accuracy, completeness, and compliance with regulatory requirements.<\/p>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3 data-start=\"3644\" data-end=\"3696\"><strong data-start=\"3648\" data-end=\"3696\">Which Companies Must Implement the Requirements and when?<\/strong><\/h3>\n<p data-start=\"3698\" data-end=\"3866\">The implementation of XBOM increasingly affects all organizations developing, integrating, or operating digital products.<br data-start=\"3819\" data-end=\"3822\" \/>The following sectors are directly impacted:<\/p>\n<ul data-start=\"3868\" data-end=\"4243\">\n<li data-start=\"3868\" data-end=\"3942\">\n<p data-start=\"3870\" data-end=\"3942\"><strong data-start=\"3870\" data-end=\"3887\">Manufacturers<\/strong> of hardware, software, or combined digital products,<\/p>\n<\/li>\n<li data-start=\"3943\" data-end=\"4026\">\n<p data-start=\"3945\" data-end=\"4026\"><strong data-start=\"3945\" data-end=\"3980\">Service providers and operators<\/strong> of critical infrastructure under <strong data-start=\"4014\" data-end=\"4023\">NIS-2<\/strong>,<\/p>\n<\/li>\n<li data-start=\"4027\" data-end=\"4124\">\n<p data-start=\"4029\" data-end=\"4124\"><strong data-start=\"4029\" data-end=\"4065\">System integrators and suppliers<\/strong> providing components for security-relevant environments,<\/p>\n<\/li>\n<li data-start=\"4125\" data-end=\"4243\">\n<p data-start=\"4127\" data-end=\"4243\"><strong data-start=\"4127\" data-end=\"4173\">Companies subject to reporting obligations<\/strong> under the <strong data-start=\"4184\" data-end=\"4214\">Cyber Resilience Act (CRA)<\/strong> or the <strong data-start=\"4222\" data-end=\"4242\">Supply Chain Act<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p data-start=\"4250\" data-end=\"4292\"><strong data-start=\"4254\" data-end=\"4292\">Timeline and Strategic Preparation<br \/>\n<\/strong>The regulatory requirements arising from <strong data-start=\"4335\" data-end=\"4344\">NIS-2<\/strong> and the <strong data-start=\"4353\" data-end=\"4383\">Cyber Resilience Act (CRA)<\/strong> will take effect in stages, with <strong data-start=\"4417\" data-end=\"4455\">NIS-2 applicable from October 2025<\/strong> and the <strong data-start=\"4464\" data-end=\"4505\">main CRA obligations by December 2027<\/strong>.<br data-start=\"4506\" data-end=\"4509\" \/>Organizations are therefore strongly advised to begin establishing an <strong data-start=\"4579\" data-end=\"4609\">XBOM framework during 2024<\/strong>.<\/p>\n<p data-start=\"4614\" data-end=\"4788\">This early preparation enables the development of the necessary technical and organizational foundations \u2014 minimizing the risk of delays, penalties, or compliance deviations.<\/p>\n<p data-start=\"4790\" data-end=\"5247\">A <strong data-start=\"4792\" data-end=\"4833\">review of existing management systems<\/strong> such as <strong data-start=\"4842\" data-end=\"4870\">Quality Management (QMS)<\/strong>, <strong data-start=\"4872\" data-end=\"4914\">Information Security Management (ISMS)<\/strong>, <strong data-start=\"4916\" data-end=\"4948\">IT Service Management (ITSM)<\/strong>, and <strong data-start=\"4954\" data-end=\"4991\">Data Protection Management (DSMS)<\/strong> is essential <strong data-start=\"5005\" data-end=\"5015\">before<\/strong> integrating XBOM into the regulatory environments of CRA and NIS-2.<br data-start=\"5083\" data-end=\"5086\" \/>This ensures that XBOM is seamlessly embedded within existing governance structures and operated as part of a <strong data-start=\"5196\" data-end=\"5246\">coherent, standards-based management framework<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h3 data-start=\"3644\" data-end=\"3696\"><strong data-start=\"3648\" data-end=\"3696\">Benefits of an XBOM St<\/strong><strong data-start=\"5258\" data-end=\"5317\">ructure \u2013 Combining SBOM and HBOM<\/strong><\/h3>\n<ul data-start=\"5319\" data-end=\"5721\">\n<li data-start=\"5319\" data-end=\"5387\">\n<p data-start=\"5321\" data-end=\"5387\"><strong data-start=\"5321\" data-end=\"5354\">Transparency and Traceability<\/strong> across the entire supply chain<\/p>\n<\/li>\n<li data-start=\"5388\" data-end=\"5475\">\n<p data-start=\"5390\" data-end=\"5475\"><strong data-start=\"5390\" data-end=\"5408\">Risk Reduction<\/strong> through early identification of vulnerabilities and dependencies<\/p>\n<\/li>\n<li data-start=\"5476\" data-end=\"5554\">\n<p data-start=\"5478\" data-end=\"5554\"><strong data-start=\"5478\" data-end=\"5524\">Accelerated Audit and Compliance Readiness<\/strong> (CRA, NIS-2, ISO standards)<\/p>\n<\/li>\n<li data-start=\"5555\" data-end=\"5625\">\n<p data-start=\"5557\" data-end=\"5625\"><strong data-start=\"5557\" data-end=\"5591\">Efficient Lifecycle Management<\/strong> for product updates and changes<\/p>\n<\/li>\n<li data-start=\"5626\" data-end=\"5721\">\n<p data-start=\"5628\" data-end=\"5721\"><strong data-start=\"5628\" data-end=\"5646\">Enhanced Trust<\/strong> among customers and regulators through verifiable security documentation<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5723\" data-end=\"6058\">XBOM is not a theoretical construct \u2014 it forms a <strong data-start=\"5772\" data-end=\"5819\">practical foundation for digital resilience<\/strong>.<br data-start=\"5820\" data-end=\"5823\" \/>By combining <strong data-start=\"5836\" data-end=\"5855\">SBOM (Software)<\/strong> and <strong data-start=\"5860\" data-end=\"5879\">HBOM (Hardware)<\/strong>, organizations achieve <strong data-start=\"5903\" data-end=\"5933\">comprehensive transparency<\/strong> from development to deployment.<br data-start=\"5965\" data-end=\"5968\" \/>Those who act early establish trust, accountability, and a tangible competitive advantage.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text css=&#8221;&#8221;] Transparency across the Supply Chain &#8211; Extended Bill of Materials (HBOM &amp; SBOM) The term XBOM (\u201cExtended Bill of Materials\u201d) describes an advanced approach for the systematic recording and documentation of all software and hardware components used within a product or system. It combines the established concepts of the Software Bill of Materials&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4315","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/4315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/comments?post=4315"}],"version-history":[{"count":6,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/4315\/revisions"}],"predecessor-version":[{"id":4355,"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/pages\/4315\/revisions\/4355"}],"wp:attachment":[{"href":"https:\/\/hkm-consulting.de\/en\/wp-json\/wp\/v2\/media?parent=4315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}