Transparency as the New Trust

2025 Global Software Assurance Mandate

Transparency Is The New Standard for Software Supply Chain Security

Transparency has become the currency of software supply chain security. Around the globe, policymakers and regulatory bodies have moved from rhetoric to regulation on that principle. SBOMs (Software Bills of Materials), attestations, and provenance tracking are no longer optional. They’re being elevated as expressions of transparency, codified in law, and embedded into how organizations will be required to demonstrate security readiness. We estimate 90% of organizations around the world will fall under one or more regulatory requirements to demonstrate evidence of software assurance.

Up to
00
%
of organizations around the world will fall under one or more regulatory requirements

In this chapter, we map the current regulatory landscape, identify key changes and enforcement deadlines as of the end of 2025, and forecast how organizations should prepare. We show how software compliance is shifting from policy to code and why teams that treat transparency as an engineering challenge will win.

From Open Source Governance to Regulatory Mandate

For years, SBOMs, consumption governance, and software supply chain transparency were treated as best-practice responses to technical risk. What changed in 2025 is that transparency moved from optional to required. Across regions, regulations are converging on the same basics: minimum SBOM elements, interoperable formats, and proof of secure development practices. The focus is no longer just what’s in the software, but who delivered it and how it was built and shipped.

This shift is also changing how compliance works. Manual checklists are giving way to automation and “compliance as code,” because procurement, audits, and enforcement increasingly demand auditable evidence. Vendors are expected to show, not just claim, that they generate SBOMs, track provenance, sign artifacts, and provide attestations when asked.

As a result, open source governance is now squarely in the regulatory spotlight. Policies that once lived as internal guidelines are becoming obligations, driven by frameworks such as the EU Cyber Resilience Act and NIS2, alongside U.S. Executive Order 14028. OSS components, forks, transitive dependencies, and license ambiguity can create exposure not only through security risk, but through procurement breach, audit failure, or product liability. The UK is moving in the same direction. The Cyber Security and Resilience Bill, recently introduced to Parliament, signals expanded scope and faster incident reporting, reinforcing that assurance has to be operational, repeatable, and provable.

Sonatype sees this evolution as a positive forcing function. The industry already knows what “good” looks like: mapped dependencies, SBOMs, signed provenance, and attestable secure practices. The work now is making those outputs default by embedding them directly into development and release workflows.

The Regulatory Map: Where Things Stand at the End of 2025

U.S. Flag in branded hex cutout

US Commercial

EO 14028

U.S. Flag in branded hex cutout

US Federal Agencies

SSDF, CISA attestation form, SBOM guidance

European Union Flag in branded hex cutout

European Union

NIS2, CRA, DORA, AI Act

United Kingdom Flag in branded hex cutout

United Kingdom

Cyber Resilience Bill and CRA

India Flag in branded hex cutout

India

CERT-In/SEBI expectations

Australian Flag in branded hex cutout

Australia

ASD ISM and continued Essential 8 emphasis

Mandates in Force/Detailed Guidance

  • European Union
  • United States (Federal)

Mandates Adopted/In Transition

  • United Kingdom
  • United States (Commercial)
  • Australia

Emerging Requirements/Guidance Only

  • India

Regulated Industries: From Software Compliance Obligation to Opportunity

Historically, heavily regulated industries, including financial services, healthcare, and critical infrastructure, have been the earliest adopters of software assurance and SBOM mandates. The regulatory developments emerging in 2025 are broadening that landscape.

Under DORA, financial institutions and their ICT third-party providers must implement comprehensive ICT-risk-management frameworks, incident reporting processes, and supplier-governance controls. Requirements for documenting cyber resilience strategies and demonstrating oversight of software supply chain risk are now appearing in procurement cycles and audit practices.

In 2025, multiple regulatory bodies began explicitly treating artificial intelligence components, including models, training data, evaluation pipelines, and automated decision systems, as software artifacts subject to supply chain controls. The AI-compliance landscape is rapidly maturing, led by the EU AI Act’s staggered phase-in schedule and U.S. federal guidance following Executive Order 14110 (later replaced by Executive Order 14179).

Global Regulatory Timeline

  • May 12, 2021
  • July 12, 2021
  • January 16, 2023
  • December 1, 2023
  • October 18, 2024
  • December 10, 2024
  • January 17, 2025
  • July 25, 2025
  • November 12, 2025

U.S. Flag in branded hex cutout

US Executive Order 14028 signed

Learn More

U.S. Flag in branded hex cutout

US NTIA publishes SBOM "Minimum Elements"

Learn More

European Union Flag in branded hex cutout

NIS2 and DORA enter into force in the EU

Learn More

Australian Flag in branded hex cutout

Australia's ASD ISM first edition released

Learn More

European Union Flag in branded hex cutout

NIS2 compliance measures apply in the EU

Learn More

European Union Flag in branded hex cutout

EU Cyber Resilience Act (CRA) entered into force

Learn More

European Union Flag in branded hex cutout

DORA compliance measures apply in the EU

Learn More

India Flag in branded hex cutout

CERT-in mandatory annual third-party cybersecurity audits in India

Learn More

Australian Flag in branded hex cutout

UK CSRB introduced to parliament

Learn More
FAKE 0, 2
FAKE 1, 2

Formats and Interoperability

The two dominant SBOM schemas are SPDX and CycloneDX. SPDX has traditionally excelled in open source license compliance and metadata governance; CycloneDX is particularly effective for vulnerability/component dependency correlation and CI/CD integration. In practical terms, organizations must evaluate when to use which schema: for licensing-governance pipelines SPDX may be the default; for live software supply chain tools, vulnerability context and runtime telemetry, CycloneDX may be preferable.

Interoperability is increasingly mandated. For example, the CRA allows the European Commission to specify by delegated acts the format and elements of SBOMs for products with digital elements. “Attestation” too has become the currency of procurement and audit readiness. In the U.S., CISA’s attestation form formalized vendor self-attestation to SSDF practices. Similarly, the EU regulatory regimes expect documented evidence of risk assessments, vulnerability-handling procedures, and software assurances.

The key operational lesson here is that transparency must be engineered: organizations must treat SBOM generation, artifact signing, attestation capture, and publishing as part of the build-and-release pipeline — not as an afterthought. The enforcement regime is moving from “show us your policy” to “show us the artifact”.

SBOM & Attestation Formats

Category

SPDX

CycloneDX

Notes

Licensing & IP metadata
strong
mixed
SPDX is fundamentally license-first (SPDX expressions, compliance lineage). CycloneDX carries license data well, but SPDX remains the legal/compliance “gold standard.”
Vulnerability/Dependency correlation
mixed
strong
CycloneDX was designed with security and dependency graphs in mind. SPDX supports this, but it’s not the primary design center.
CI/CD Friendliness
mixed
strong
CycloneDX was designed with security and dependency graphs in mind. SPDX supports this, but it’s not the primary design center.
Ecosystem Tooling & Adoption
mixed
strong
CycloneDX has stronger momentum in AppSec, SCA, and cloud-native tooling. SPDX remains dominant in regulated, supplier-driven, and government contexts — strong, but slower-moving.

SPDX

Category
Licensing & IP metadata
strong
Vulnerability/Dependency correlation
mixed
CI/CD Friendliness
mixed
Ecosystem Tooling & Adoption
mixed

CycloneDX

Category
Licensing & IP metadata
mixed
Vulnerability/Dependency correlation
strong
CI/CD Friendliness
strong
Ecosystem Tooling & Adoption
strong

Notes

Category
Licensing & IP metadata
SPDX is fundamentally license-first (SPDX expressions, compliance lineage). CycloneDX carries license data well, but SPDX remains the legal/compliance “gold standard.”
Vulnerability/Dependency correlation
CycloneDX was designed with security and dependency graphs in mind. SPDX supports this, but it’s not the primary design center.
CI/CD Friendliness
CycloneDX was designed with security and dependency graphs in mind. SPDX supports this, but it’s not the primary design center.
Ecosystem Tooling & Adoption
CycloneDX has stronger momentum in AppSec, SCA, and cloud-native tooling. SPDX remains dominant in regulated, supplier-driven, and government contexts — strong, but slower-moving.

Open Source License Compliance in the New Regime

Key risk patterns include transitive copyleft propagation (when combining or distributing code with copyleft-licensed dependencies can trigger downstream obligations), unclear or missing license metadata, and forked components that diverge from upstream development, making provenance and patch-tracking difficult. The compliance challenge is to define meaningful metrics. For example, the percentage of components with approved licenses, the number of license conflicts detected pre-merge, and the mean remediation time for license-non-compliant usage. While current compliance regimes rarely specify exact thresholds for these metrics, the trend is clear: organizations that cannot demonstrate open source license compliance of intake and remediation are increasingly disadvantaged in procurement, audit, and regulatory contexts.

Under the CRA, for instance, open source software stewards must put in place and document in a verifiable manner a cybersecurity policy and cooperate with market surveillance authorities and CSIRTs/ENISA in certain circumstances. They may also need to provide security documentation and, in some cases, attestations of compliance. At Sonatype, we increasingly advise clients that an open source intake policy is no longer just software governance best practice — it is rapidly becoming a compliance expectation.

The practical implication is that organizations must operationalize OSS intake, contribution, and remediation workflows; integrate open source license compliance scanning and component metadata tracking into CI/CD; ensure SBOMs capture accurate license data; and maintain audit logs of intake decisions. Downstream, procurement teams are beginning to require supplier attestations that OSS intake and license governance policies are in place and followed.

Bringing Software Assurance Policy Into Reality

Whether your discussion is around Compliance-as-Code, Policy-as-Code, GRC Engineering, or some other umbrella term — the industry is shifting toward automated governance to keep pace with the exponential acceleration in both software development speed and malware presence.

Compliance-as-Code-2 (1)

As we can see in the CNCF’s Automated Governance Maturity Model and OpenSSF’s Gemara, software development lifecycles can be significantly accelerated while improving compliance outcomes by ensuring codification and automation at every opportunity:

  • Writing organizational policies in a machine-optimized format reduces friction for both human and AI interactions as tools interface with structured data. Policies turn compliance into a foundational design requirement instead of being stapled on after development.
  • Selection of development tools can be done with early feedback according to policy, informed by supplier onboarding workflows: standardized questionnaires, third-party assessment checklists, attested secure development practices.
  • Development tools can provide early feedback both in the IDE and at pull/merge time with evaluation and enforcement of priorities such as license requirements and trusted dependency registries; blocking patterns if disallowed licenses or untrusted sources are requested.
  • Deployment builds can automatically evaluate code and enforce requirements such as generation of SBOMs (SPDX or CycloneDX) with all dependencies, versions, metadata, and signatures. At release time, attachment of signed provenance data and attestation artifacts to the release package.
  • Audits become streamlined by using compiling machine-readable policies, evaluation logs, enforcement results, and relevant artifacts (e.g., via a customer-accessible portal, or public registry) to support audit, procurement, or regulator review.

The question is not whether your organization can produce an SBOM or attestation, but whether it has the automation, traceability, and audit-readiness baked into the build workflow. Compliance is not an add-on; it must be part of the entire software development lifecycle.

Software Assurance Metrics and Maturity for Self-Assessment

Transparency and software compliance readiness must be measured. Sonatype recommends organizations track four dimensions: Coverage, Integrity, Responsiveness, and Software Assurance.

  • Coverage: What proportion of shipped artifacts include SBOMs? What percentage of components have declared licenses and an explicit policy decision?
  • Integrity: How deep is your SBOM (i.e., dependency depth)? Are provenance records signed and traceable? Is your rebuild reproducible? What signal-to-noise ratio do your scans produce (i.e., real vulnerabilities vs false positives)?
  • Responsiveness: What is your mean time to provide a customer or regulator an SBOM or attestation? What is your mean time to resolve a non-compliant license usage? What is the median time to apply a post-release security update
  • Assurance: What percentage of releases meet SSDF-defined attestation? What percentage of your suppliers provide verifiable artifacts (SBOMs, signed provenance, secure development attestation)?

Software Maturity Assessment

Control

Metric

Readiness

Transparency
% of artifacts with SBOM provenance
90% = Mature
Licensing
% of dependencies with approved license
90%+ = mature
Security Response
Mean time to patch vulnerabilities
90%+ = mature
Attestation
Releases meeting SSDF standard
80%+ = mature

Metric

Control
Transparency
% of artifacts with SBOM provenance
Licensing
% of dependencies with approved license
Security Response
Mean time to patch vulnerabilities
Attestation
Releases meeting SSDF standard

Readiness

Control
Transparency
90% = Mature
Licensing
90%+ = mature
Security Response
90%+ = mature
Attestation
80%+ = mature

One-Year Software Compliance Playbook

Based on our experience across clients and regulatory developments, here is a recommended playbook for organizations aiming to be fully compliant (and competitive) in a world of compliance through governance.

Timeframe

Primary Goal

Key Actions

Outputs

0-3 Months

Primary Goal:

ESTABLISH OWNERSHIP AND BASELINE

Key Actions:

  • Name cross-functional compliance owners

  • Inventory SBOM coverage

  • Choose SPDX/CycloneDX

  • Validate toolchain

  • Run attestation gap analysis (signing, pipeline evidence, vuln mgmt)

Outputs:

  • Ownership model

  • SBOM baseline

  • Schema decision

  • Gaps list

3-6 Months

Primary Goal:

OPERATIONALIZE COMPLIANCE IN CI/CD

Key Actions:

  • Require SBOM per release

  • Sign and (if needed) publish

  • Map obligations (CRA/NIS2/AI Act as applicable)

  • Define required artifacts

  • Implement compliance-as-code (license gate, SBOM at build, provenance at release)

  • Start metrics

Outputs:

  • SBOM + signed provenance in pipeline

  • Obligations/ artifact catalog

  • Initial metrics

6-12 Months

Primary Goal:

EXTEND TO SUPPLIERS AND AUDIT READINESS

Key Actions:

  • Standardize supplier onboarding

  • Require supplier attestations, SBOMs, signed provenance

  • Quarterly reporting dashboards

  • License conflict + copyleft workflows

  • Make artifacts accessible and auditable

Outputs:

  • Supplier requirements in place

  • Dashboards

  • Audit-ready evidence repository

By the end of the year, your goal should be: all major releases produce SBOMs, all software vendors/suppliers have attested secure-development practices, all major components have approved licenses, and compliance metrics are live in software governance dashboards.

Software Assurance as Currency

2025 marked the inflection point. In 2026, software assurance becomes the standard by which software earns trust. Transparency through SBOMs, attestations, and provenance is moving from policy to regulation, from a nice-to-have to a procurement requirement, and from an audit checkbox to a competitive differentiator.

Sonatype views these mandates as catalysts for safer software. When compliance is built into the delivery process, software becomes more measurable, auditable, and secure.

sonatype-sbom-manager-logo-white

AUTOMATE SOFTWARE COMPLIANCE AND MANAGE SBOMS AT SCALE

Organizations that embed transparency into build pipelines, integrate supplier attestations into procurement, and treat SBOMs and provenance as first-class artifacts will be ahead of the curve. Everyone else risks procurement lockout, audit disruption, and downstream liability. 

In 2026, compliance is not just about avoiding penalties. It is about earning trust, and trust is the core asset of the software supply chain.

brand blue glyph download

Download the Full Report

brand blue glyph right arrow

A Look Back: Past Reports