Back to Blog
DevOps & Platform Eng

The Software Supply Chain Is Under Attack — SBOM and DevSecOps Must Converge

Software supply chain faces $60B in losses with vulnerabilities doubling to 581 per codebase. 70%+ experienced incidents. 30% of breaches involve third parties. 48% fall behind SBOM mandates. EU CRA requires 24-hour reporting from September 2026. SBOM and DevSecOps must converge into unified pipelines with curation-first models.

DevOps & Platform Eng
Thought Leadership
10 min read
3 views

The software supply chain is under sustained attack, with supply chain incidents more than doubling in 2025 and global losses reaching $60 billion according to industry analysis. Mean vulnerabilities per codebase climbed from 280 to 581 in one year, more than doubling according to Black Duck’s 2026 Open Source Security Report. Furthermore, over 70% of organizations reported experiencing at least one third-party or supply chain-related security incident. Nearly all audited codebases contain open-source components, making every application a potential target. However, 48% of security professionals admit their organizations fall behind SBOM mandates. Meanwhile, the EU Cyber Resilience Act takes effect in September 2026 with strict vulnerability reporting and SBOM requirements. The convergence of SBOM adoption and DevSecOps practices is no longer optional. It is the minimum viable security posture for organizations shipping software in 2026.

$60B
Global Losses From Supply Chain Attacks in 2025
581
Mean Vulnerabilities Per Codebase (Up From 280)
70%+
Experienced Supply Chain Security Incidents

Why the Software Supply Chain Is Under Attack

The software supply chain is under attack because compromising one vendor or one open-source package can reach thousands of downstream organizations simultaneously. Attackers target suppliers because they often have weaker security controls than the enterprises they serve. Stolen vendor credentials provide direct access to customer environments, bypassing perimeter defenses entirely. Furthermore, malicious packages, dependency confusion attacks, and typosquatting have become common attack methods across npm, PyPI, and other package ecosystems. The software supply chain security market is expected to hit $2.16 billion in 2025.

In addition, approximately 30% of all breaches now involve third-party compromise. Large-scale campaigns in the npm ecosystem demonstrated coordinated efforts to evade static inspection and deliver malicious payloads during installation. One self-propagating campaign compromised hundreds of packages and exposed a large volume of credentials before containment. As a result, dependency management has shifted from a purely technical concern to a board-level security priority.

Moreover, AI-generated malicious code is expanding the attack surface. As AI code generation becomes prevalent, attackers leverage it to create more sophisticated, harder-to-detect malicious packages. The speed gap between attackers and defenders favors the adversary because defenders are slowed by procurement, legal reviews, and legacy infrastructure integration. Therefore, organizations must build systems resilient by design rather than relying on manual heroism that cannot scale against automated threats.

The AI Model Supply Chain

In 2026, an AI model is just another third-party dependency, but one that traditional scanners cannot read. Pickle injection allows remote code execution when loading certain model formats. Model weights provenance questions remain unanswered for most deployments. Just as organizations need SBOMs for code, they now need ML-BOMs for AI models documenting training data, architecture decisions, and safety benchmarks. The convergence of MLSecOps with DevSecOps extends supply chain security into the AI layer.

Why SBOM and DevSecOps Must Converge

SBOM and DevSecOps must converge because static inventories alone cannot protect dynamic software delivery pipelines that deploy code to production daily or even hourly. The question is no longer whether you have an SBOM but whether you have the governance to act on it continuously. Furthermore, vulnerability volumes have grown so large that manual triage is mathematically impossible. The sheer scale of the ecosystem means human heroism is no longer a scalable defense strategy. Organizations must build systems where security enforcement is automated and embedded into every pipeline stage.

SBOM as Dynamic Observability
SBOMs must become a dynamic layer of observability rather than a static compliance document. Teams need to instantly query their entire fleet to answer where a vulnerable component is installed. Consequently, during incidents like Log4j, organizations with SBOMs identified exposure in minutes while others took days.
Policy-as-Code Enforcement
Policy-as-Code embeds security rules directly into CI/CD pipelines, enforcing them automatically on every commit. This ensures immediate visibility needed for strict reporting timelines without slowing developers. Furthermore, automated enforcement catches issues earlier and reduces manual security work.
Curation-First Model
Organizations must block malicious, vulnerable, or license-incompatible packages at ingestion rather than discovering them in production. Scanning after the fact is no longer sufficient. Therefore, the curation-first model prevents supply chain attacks before compromised code enters the build environment.
Pipeline Bill of Materials
PBOMs map the full build path from source control through deployment. This gives traceability across every artifact and process. As a result, organizations can pinpoint the exact build or image that introduced a vulnerable component, reducing investigation time significantly.

“The question is no longer if you have an SBOM — but if you can act on it.”

— Cloudsmith Supply Chain Security Guide, 2026

The Regulatory Landscape Forcing Convergence

Regulations are forcing the convergence of SBOM and DevSecOps by mandating capabilities that neither approach can deliver independently.

Regulation SBOM Requirement DevSecOps Implication
US Executive Order 14028 SBOMs mandatory for federal software ✓ Automated SBOM generation in CI/CD
EU Cyber Resilience Act SBOMs with direct dependencies minimum ✓ Continuous vulnerability management through product lifecycle
EU CRA Reporting 24-hour incident notification required ✓ Automated vulnerability scanning and instant querying
Gartner Prediction 60% mandate SBOMs for critical software ◐ Already exceeded in early 2026

Notably, the EU Cyber Resilience Act mandates vulnerability reporting within strict timelines and SBOM documentation that must remain current across the product lifecycle. Organizations deploying code to production daily cannot meet these requirements through manual processes. Furthermore, legal exposure climbs alongside security risk as regulatory enforcement tightens. A seven-day waiting period on new package versions would have prevented eight out of ten major 2025 supply chain attacks. As a result, regulatory compliance is converging with operational security, making the SBOM-DevSecOps integration a business requirement rather than a security preference.

The Open-Source Maintenance Debt

Open-source software does not operate like commercial software. It is not managed by a product manager and there is no support department. Managing obsolete third-party code is a direct challenge under the EU CRA. Manufacturers must maintain access to updates throughout a product’s support period. When a critical open-source dependency becomes unmaintained, organizations face the choice between forking the project, finding alternatives, or accepting unpatched vulnerability risk that regulators will not tolerate.

Building Converged Software Supply Chain Security

Converged supply chain security integrates SBOM generation, vulnerability scanning, and policy enforcement into a unified DevSecOps pipeline that operates continuously and automatically. The convergence means that security feedback is intelligent, contextual, and actionable directly in the developer workspace rather than arriving as a flood of low-impact alerts after code is already in production. Furthermore, converged approaches treat the SBOM as a dynamic observability layer rather than a static compliance artifact. This allows teams to instantly query their entire software fleet when a new vulnerability is disclosed, answering where a vulnerable component lives across all environments within minutes.

Converged Security Practices
Automating SBOM generation on every build with tools like Syft and CycloneDX
Implementing curation-first dependency management blocking threats at ingestion
Enforcing Policy-as-Code in CI/CD pipelines for every commit automatically
Signing artifacts with Sigstore to verify provenance through the delivery chain
Supply Chain Anti-Patterns
Scanning dependencies only before release rather than at ingestion
Using broad version ranges like wildcards instead of pinned dependencies
Treating SBOMs as static compliance documents rather than dynamic observability
Ignoring AI model dependencies in the supply chain security scope

Five Software Supply Chain Priorities for 2026

Based on the threat landscape, here are five priorities for supply chain security:

  1. Implement automated SBOM generation on every build: Because 48% fall behind SBOM mandates, embed SBOM generation into CI/CD pipelines using tools like Syft or CycloneDX. Consequently, you maintain real-time inventory of every dependency across your entire software fleet.
  2. Adopt the curation-first dependency model: Since scanning after the fact is insufficient, block malicious or vulnerable packages at ingestion before they enter your build environment. Furthermore, a seven-day waiting period on new packages prevents most supply chain attacks.
  3. Deploy Policy-as-Code in every pipeline: With EU CRA requiring 24-hour incident reporting, enforce security policies automatically on every commit through tools like Open Policy Agent. As a result, compliance becomes continuous rather than periodic.
  4. Extend supply chain security to AI models: Because AI models are third-party dependencies that traditional scanners miss, create ML-BOMs documenting training data and model provenance. Therefore, AI supply chain risks receive the same governance as code dependencies.
  5. Prepare for EU Cyber Resilience Act compliance: Since CRA enforcement begins September 2026, build the vulnerability management and SBOM capabilities the regulation demands now. In addition, early compliance avoids the rushed implementation that creates security gaps.
Key Takeaway

The software supply chain faces unprecedented attack volume with $60B in losses and vulnerabilities doubling to 581 per codebase. 70%+ experienced incidents. 30% of breaches involve third parties. 48% fall behind SBOM mandates. EU CRA requires 24-hour reporting from September 2026. SBOM and DevSecOps must converge into unified pipelines. Curation-first models block threats at ingestion. Policy-as-Code automates enforcement. AI models need ML-BOMs. Seven-day package waiting periods prevent most attacks.


Looking Ahead: Software Supply Chain Security Beyond 2027

The software supply chain will face escalating threats as AI-generated malicious code becomes more sophisticated. Attack propagation will become faster and broader while regulatory requirements expand across jurisdictions. SBOM requirements will expand beyond federal contractors to become universal across regulated industries globally. Furthermore, the convergence of SBOM, DevSecOps, and MLSecOps will create unified governance platforms managing code dependencies, binary artifacts, and AI models through a single pane of observability. The industry is shifting from reactive vulnerability scanning to proactive high-velocity hygiene where the question changes from whether something is vulnerable to how fast the organization can upgrade everything across its entire dependency tree.

However, the defenders who build converged security capabilities now will respond to future attacks in minutes rather than the days or weeks that fragmented approaches require. In contrast, organizations still treating dependency management as an afterthought will face both security incidents and regulatory penalties that converged approaches prevent. For engineering leaders, the software supply chain is therefore the security domain where convergence delivers the highest combined value. Threat prevention, incident response speed, and regulatory compliance all improve simultaneously through unified SBOM-DevSecOps pipelines. The organizations that achieve this convergence in 2026 will ship software with confidence and speed while competitors face the compounding costs of fragmented security approaches that cannot match the velocity of modern threats or satisfy the increasingly strict and evolving demands of modern regulatory frameworks across all multiple jurisdictions.

Related Guide
Our DevOps and DevSecOps Services: Security-First Engineering


Frequently Asked Questions

Frequently Asked Questions
Why are software supply chain attacks increasing?
Supply chain attacks doubled in 2025 with $60B in losses. Compromising one package reaches thousands downstream. Nearly all codebases contain open source. Mean vulnerabilities doubled to 581 per codebase. AI-generated malicious code creates harder-to-detect packages.
What is an SBOM and why does it matter?
A Software Bill of Materials lists all components and dependencies in software. SBOMs enable rapid incident response. During Log4j, organizations with SBOMs identified exposure in minutes versus days. US Executive Order 14028 mandates SBOMs for federal software. EU CRA requires SBOMs from September 2026.
Why must SBOM and DevSecOps converge?
Static SBOMs alone cannot protect dynamic pipelines. DevSecOps without SBOMs lacks component visibility. Convergence creates automated, continuous security across the entire delivery chain. Policy-as-Code enforces security on every commit while SBOMs provide the dependency intelligence.
What is the curation-first dependency model?
Curation-first blocks malicious, vulnerable, or license-incompatible packages at ingestion before they enter the build environment. This prevents supply chain attacks at the earliest possible point. A seven-day waiting period on new package versions would prevent most supply chain attacks.
What does the EU Cyber Resilience Act require?
The CRA requires SBOM documentation with at least direct dependencies. Organizations must report exploitable vulnerabilities within strict timelines. Manufacturers must manage vulnerabilities throughout a product’s support period. Enforcement begins September 2026 with SBOMs requestable during audits.

References

  1. 581 Vulnerabilities, Open-Source Debt, EU CRA, SBOM Mandates: Help Net Security — Open-Source Security Debt Grows Across Commercial Software
  2. $60B Losses, 70%+ Incidents, 7-Day Prevention, Attack Patterns: Bastion — 2026 Supply Chain Security Report
  3. Curation-First, MLSecOps, PBOM, Dynamic SBOM, Policy-as-Code: Cloudsmith — The 2026 Guide to Software Supply Chain Security
Weekly Briefing
Security insights, delivered Tuesdays.

Join 1 million+ security professionals. Practical, vendor-neutral analysis of threats, tools, and architecture decisions.