Cookies Notice
This site uses cookies to deliver services and to analyze traffic.
📣 Introducing AI Threat Modeling: Preventing Risks Before Code Exists
A cryptographic bill of materials (CBOM) is a structured inventory of all cryptographic assets used within a software application, system, or infrastructure. It catalogs encryption algorithms, key lengths, certificate configurations, hashing functions, protocol versions, and the libraries that implement them. The goal is to give organizations a clear, queryable record of how and where cryptography is applied across their software portfolio.
CBOMs have gained urgency as organizations prepare for post-quantum cryptography migration. Knowing which cryptographic primitives are in use, and where, is a prerequisite for assessing exposure to quantum-capable attacks and planning algorithm transitions without breaking production systems.
A software bill of materials (SBOM) catalogs the components that make up a piece of software: open-source libraries, third-party packages, and their dependency relationships. It answers the question “what is this software built from?” A CBOM answers a different question: “what cryptographic mechanisms does this software use, and how are they configured?”
The table below shows how CBOM relates to other BOM types:
| BOM Type | Focus | Primary Use Cases |
| SBOM | Software components and dependencies | Vulnerability management, license compliance, supply chain risk |
| CBOM | Cryptographic algorithms, keys, certificates, protocols | Crypto-agility, quantum readiness, compliance with cryptographic standards |
| HBOM | Hardware components and firmware | Supply chain integrity, firmware vulnerability tracking |
| PBOM | Pipeline artifacts, build tools, and processes | Build provenance and completeness |
SBOMs and CBOMs are complementary. An SBOM might identify that an application uses OpenSSL 3.1, but only a CBOM reveals which specific algorithms, cipher suites, and key configurations that OpenSSL instance is using. Organizations building a practical SBOM program should consider extending their inventory practices to include CBOM data for complete supply chain visibility.
Related Content: PBOM vs. SBOM
A comprehensive CBOM captures cryptographic usage across multiple layers of the application stack. The core elements include:
CBOM security depends on keeping this inventory accurate and current. Static snapshots go stale quickly, especially in environments where infrastructure is provisioned dynamically and configurations change with every deployment.
A well-maintained CBOM enables several high-value security and compliance outcomes:
For organizations scaling their CBOM certification and compliance efforts, automating CBOM generation from source code, container images, and cloud workloads is essential. Manual inventory approaches cannot keep pace with modern deployment velocity.
An SBOM lists software components and dependencies. A CBOM specifically inventories cryptographic assets: algorithms, keys, certificates, and protocols used within those components.
At minimum: encryption algorithms, key lengths, hashing functions, certificate details, protocol versions, cryptographic library versions, and the application context where each asset is used.
Automated tools scan codebases for cryptographic API calls, analyze container images for library versions and configurations, and query cloud services for TLS and certificate settings to build the inventory.
A CBOM reveals every instance of quantum-vulnerable cryptography across the portfolio, enabling teams to scope migration efforts, prioritize high-risk systems, and execute algorithm transitions methodically.
Ownership varies, but it typically falls to a cross-functional group. Platform engineering generates the data, AppSec integrates it into risk workflows, and a dedicated crypto or compliance team sets policy.