Under active development Content is continuously updated and improved

PS.3.2Collect, safeguard, maintain, and share provenance data for all components of each software release (e.g., in a software bill of materials [SBOM]).

PS.3

>Control Description

Collect, safeguard, maintain, and share provenance data for all components of each software release (e.g., in a software bill of materials [SBOM]).

>Practice: PS.3

Archive and Protect Each Software Release

Preserve software releases in order to help identify, analyze, and eliminate vulnerabilities discovered in the software after release.

>Notional Implementation Examples

  1. 1.Make the provenance data available to software acquirers in accordance with the organization’s policies, preferably using standards-based formats.
  2. 2.Make the provenance data available to the organization’s operations and response teams to aid them in mitigating software vulnerabilities.
  3. 3.Protect the integrity of provenance data, and provide a way for recipients to verify provenance data integrity.
  4. 4.Update the provenance data every time any of the software’s components are updated.

>Cross-Framework References

Mappings to related frameworks and standards from NIST SP 800-218

BSA FSS

SM.2

BSIMM

SE3.6

CNCF SSCP

Securing Materials—Verification
Automation

EO 14028

4e(vi)
4e(vii)
4e(ix)
4e(x)

NTIA SBOM

All

OWASP SCVS

1.4
2

SAFECode SIC

Vendor Software Delivery Integrity Controls

SAFECode TPC

MAINTAIN3

SP 800-53

SP 800-161

SA-8
SR-3
SR-4

Ask AI

Configure your API key to use AI features.