What You Need to Know about the Different Types of SBOMs

31.10.2025

Marcus Lucero

Open Source

When it comes to managing software security and compliance, understanding and generating Software Bill of Materials (SBOMs) is crucial—especially with the increasing use of third-party and open-source code. The Cybersecurity and Infrastructure Security Agency (CISA) has defined six different types of SBOMs, each linked to different stages of the software development lifecycle (SDLC). Here’s a breakdown of these SBOM types and when they might be useful for your organization.

1. Design SBOM

A Design SBOM represents the intended architecture and components of a software product, often created from initial specifications. This SBOM is useful for spotting compatibility issues before acquisition or development begins. However, generating a Design SBOM can be complex, and it might not capture all the necessary details.

2. Source SBOM

A Source SBOM is created directly from the development environment and gives insight into the components used during the build process. It highlights vulnerabilities and dependencies—both direct and transient—but may include unused components, which could add unnecessary noise.

3. Build SBOM

Produced during the build process, this SBOM offers a more accurate representation of the final software product. By integrating with CI/CD workflows, Build SBOMs ensure trust through digital signing and give greater visibility into compiled components. However, they may require adjustments to the build process and won’t always capture runtime or dynamically linked dependencies.

4. Analyzed SBOM

Generated through post-build artifact analysis, an Analyzed SBOM can be especially helpful for legacy systems where development environments no longer exist. It helps verify other SBOMs but may rely on heuristics, which can introduce errors.

5. Deployed SBOM

This SBOM captures the inventory of software components as they exist on a deployed system, making it ideal for systems where runtime configurations matter. However, it may not fully reflect what is actually running.

6. Runtime SBOM

A Runtime SBOM records only what is actively running in the system, capturing dynamically loaded components and external interactions. While this SBOM type is invaluable for application security, it might not be ideal for copyright or license compliance.

Selecting the Right SBOM for Your Organization

Choosing the best SBOM type depends on your specific use case and risk profile. If you’re focused on compliance or intellectual property protection, Source and Build SBOMs might be your go-to options. For real-time security insights, Runtime SBOMs offer a dynamic look into your system’s behavior.

Whether you’re navigating M&A due diligence or protecting sensitive systems, leveraging the right SBOM tools is key to maintaining security and compliance. Bitsea’s services help you create comprehensive SBOMs to ensure you’re in control of your software components.

Want to dive deeper into mastering open-source compliance? Let’s connect—schedule a call with one of our experts today.


Source Material

CISA.gov. “Types of Software Bill of Materials (SBOM) Documents.” Types of Software Bill of Material (SBOM) Documents, www.cisa.gov/sites/default/files/2023-04/sbom-types-document-508c.pdf. Accessed 16 Oct. 2024.

National Telecommunications and Information Administration. “The Minimum Elements for a Software Bill of Materials” https://www.ntia.doc.gov/files/ntia/publications/sbom _minimum_elements_report.pdf. Accessed 05 Nov. 2024.