PBOM & attestation: the next stage of evolution
To close the blind spots of the SBOM, an extended security model is coming into focus: the Pipeline Bill of Materials (PBOM).
Rather than being a fixed standard, it is a conceptual model for what is known as build provenance. The goal is to create a complete, tamper-proof record of origin for every software artifact. This is reinforced by cryptographically secured attestations (digital certifications).
Imagine receiving a valuable shipment (your software):
- The SBOM is the inventory list inside the package: “1 gold bar, 10 kg.”
- The PBOM, on the other hand, is the digital logbook of the armored transport vehicle: it records who left the depot and when, which route was taken, which security checks were carried out at checkpoints, and who held the key to the cargo hold at every point in time.
Only when the log (PBOM) proves that the transporter was never left unattended can you be certain that the contents (SBOM) were not tampered with unnoticed.
What a PBOM documents in the digital realm
A PBOM-oriented approach creates a detailed “logbook” of the software creation process. This includes:
- The workbench: Which CI/CD systems (e.g. GitHub Actions, GitLab, Tekton) were used?
- The actors: Which identities and permissions were active during the build process?
- The tools: Which build runners, scripts, and versions were deployed?
- The sources: From which repositories were the raw inputs retrieved?
- The seal: What did the signing and release processes look like?
Initiatives such as SLSA (Supply-chain Levels for Software Artifacts), in-toto, and Sigstore already provide the technical building blocks to generate these proofs in an automated way.
From assumption to proof
The key difference can be summed up in a simple formula: while the SBOM documents what was built, the PBOM proves how, where, and under which conditions it was created.
This shift in perspective marks the transition to "evidence-based security": trust is no longer assumed (implicit trust), but is instead made verifiable through cryptographically secured chains of evidence.