SBOM and VEX Workflows for Scalable Vulnerability Management

You need more than visibility to manage product security at scale. An SBOM shows what is inside your product, but it does not tell you which findings need action first. When you combine SBOM and VEX workflows, you create a clearer path for prioritization, compliance, and faster response across the product lifecycle.
Key Takeaways
- An SBOM shows what software components are inside a product, including versions, suppliers, and dependencies
- VEX adds context by explaining whether known vulnerabilities actually affect your specific product
- Using SBOM and VEX together helps teams prioritize real risks instead of chasing every scanner alert
- Strong workflows improve remediation speed, ownership clarity, customer communication, and audit readiness
- The Cyber Resilience Act increases pressure for better component documentation and timely vulnerability handling
- Automating SBOM creation in CI/CD pipelines creates reliable release evidence and faster traceability during incidents
- Continuous lifecycle monitoring is essential because fielded products may remain active for years after release
- Scalable programmes combine tooling, governance, and integration with systems like Jira, Jenkins, and Splunk
SBOM and VEX in Product Security
Connected products depend on many internal and third-party software components. That creates risk, especially when new vulnerabilities are disclosed every day. SBOM and VEX workflows help you understand exposure and respond with evidence-based decisions.
SBOM as Structured Component Documentation
An SBOM, or Software Bill of Materials, is a machine-readable list of software components used in your product. It can include open-source libraries, commercial packages, internal modules, firmware elements, and version data. This gives you a reliable record of what has been shipped and where affected components may exist.
For product teams, an SBOM supports faster release decisions and cleaner handovers between engineering, security, and compliance. For PSIRT teams, it reduces time spent identifying whether a vulnerable component is present. For leadership, it improves operational visibility across multiple product lines.
A mature SBOM process should capture:
- Direct and transitive dependencies
- Component versions and suppliers
- Unique identifiers such as PURL or CPE
- Build and release version mapping
- Historical records for shipped products
VEX: Exploitability Status and Prioritization
VEX, or Vulnerability Exploitability eXchange, adds business and technical context to vulnerability findings. It helps you state whether a known issue actually affects your product and whether remediation is required. This is where VEX SBOM workflows become highly valuable.
A scanner may flag a vulnerable library, but that does not always mean your product is exploitable. The vulnerable code may not be used, may be disabled, or may already be mitigated. VEX helps you communicate that status in a structured way.
Common VEX outcomes include:
- Affected
- Not affected
- Fixed
- Under investigation
Regulatory Framework: Cyber Resilience Act
The Cyber Resilience Act raises expectations for manufacturers of products with digital elements. You need stronger security processes, clearer documentation, and a repeatable vulnerability management model. This is especially relevant for connected and embedded products.
Many organizations still treat product cybersecurity like traditional IT security. That creates gaps because products have longer lifecycles, firmware dependencies, supplier complexity, and field-deployed assets. A product-focused operating model is essential.
SBOM Documentation Requirements
The CRA places importance on documenting software components used within products. That makes the SBOM a practical foundation for technical files, supplier transparency, and lifecycle evidence. Without structured component records, proving compliance becomes harder.
You should be able to show:
Many organizations still manage component records through spreadsheets, emails, and disconnected systems. Using an SBOM management tool can reduce manual tracking and improve consistency across teams. It also helps you maintain accurate version histories, improve traceability, and respond faster when new vulnerabilities are disclosed.
Obligations for Vulnerability Remediation and Disclosure
The CRA also increases focus on handling vulnerabilities without unnecessary delay. That means assessing findings, prioritizing risk, fixing material issues, and communicating updates where required. Speed matters, but accuracy matters just as much.
If every alert is treated the same, teams waste effort and critical issues may be delayed. VEX helps you separate noise from genuine product risk. This supports better remediation decisions and stronger reporting discipline.
Why Transparency Alone Is Not Enough
Many organizations stop after generating an SBOM. That improves transparency, but transparency alone does not solve operational pressure. You still need to decide what to fix, who owns it, and how to prove action taken.
A large product portfolio can generate thousands of components matches against public CVE databases. Some will be serious, some irrelevant, and many unclear. Without SBOM VEX processes, teams often rely on spreadsheets, email threads, and slow manual triage.
This creates common problems:
- Backlogs of unreviewed findings
- Poor prioritization of engineering effort
- Inconsistent customer messaging
- Weak audit evidence
- Friction between security and product teams
SBOM and VEX together move you from passive visibility to active decision-making.
Integrated SBOM and VEX Workflow
The most effective model embeds security and compliance into normal delivery processes. That means generating evidence during development, not reconstructing it later. A joined-up workflow reduces costs and improves speed.
Automated SBOM Generation in CI/CD
Your CI/CD pipeline should generate an SBOM for every production-ready build. This creates a consistent record tied to the exact release version. It also removes reliance on manual exports or outdated spreadsheets.
When automated, you gain:
- Repeatable release evidence
- Faster traceability during incidents
- Better supplier component visibility
- Cleaner handover to compliance teams
Vulnerability Scanning and Impact Assessment
Once an SBOM exists, it can be checked against known vulnerability sources. This identifies potentially affected components quickly across current and historic releases. The next step is impact assessment.
Impact assessment should consider:
- Is the component present?
- Is the vulnerable function used?
- Is the attack path reachable?
- Are controls already in place?
- Which customers or products are affected?
Many security teams still spend too much time reviewing alerts that pose little or no real product risk. This is where automated vulnerability management creates strong operational value by reducing manual review time. It also helps you prioritize material issues faster, improve response consistency, and keep engineering effort focused on the findings that matter most.
Creating and Maintaining VEX Statements
After assessment, you can issue or update VEX statements for relevant findings. These records help internal teams, customers, and regulators understand status. They also create a documented decision trail.
Good governance means VEX statements are reviewed when:
- A new CVE is published
- Product architecture changes
- A patch is released
- New exploit intelligence emerges
- Customer environments change risk exposure
Distribution and Lifecycle Monitoring
Security work does not end at release. Products in the field may remain active for years, especially in industrial, automotive, and medical settings. You need continuous monitoring after shipment.
That includes maintaining historic SBOM records, updating VEX positions, and notifying stakeholders when material risk changes. ONEKEY supports this lifecycle model by helping teams monitor products from design to end-of-life.
Governance and Operational Responsibilities
Tools alone do not create scalable security. Clear ownership, approval points, and communication routes are just as important. Strong governance keeps response activity consistent under pressure.
PSIRT Responsibilities
PSIRT teams often lead intake, triage, coordination, and disclosure management. They need accurate product data, fast engineering input, and a clear escalation model. SBOM and VEX workflows give them structured evidence to work from.
Typical PSIRT ownership includes:
- Vulnerability intake and triage
- Severity review
- Cross-functional coordination
- External communication
- Closure evidence and reporting
Alignment Between Product and Engineering
Product owners balance roadmap delivery, customer expectations, and risk decisions. Engineering teams need clear priorities rather than long lists of scanner alerts. Shared workflows improve trust and execution.
A practical model is:
Compliance Documentation and Audit Readiness
When regulators, customers, or auditors ask for evidence, delays create pressure. You should be able to show component records, remediation history, and decision rationale quickly. Structured workflows make that possible.
Useful evidence includes:
- Version-specific SBOMs
- Vulnerability review logs
- VEX status records
- Patch timelines
- Disclosure communications
Scaling SBOM and VEX Workflows with Automation
Manual processes may work for one product. They usually fail across multiple teams, frequent releases, and global product fleets. Scale requires automation, integration, and standardized controls.
A modern platform should connect with tools such as Jenkins, Jira, and Splunk so security activity fits existing operations. It should also reduce repetitive work for engineering and compliance teams. That is where ONEKEY provides value across the full lifecycle.
You should look for capabilities such as:
- Continuous SBOM generation
- Vulnerability correlation
- Central VEX management
- Workflow integrations
- Evidence reporting
- Multi-product visibility
Compliance Checklist
Use this checklist to assess your current maturity. If several answers are no, your process may not scale well.
- Do you generate an SBOM for every release?
- Can you trace findings to exact product versions?
- Do you use VEX to prioritize relevant issues?
- Are ownership roles clearly defined?
- Can you produce audit evidence quickly?
- Are fielded products continuously monitored?
- Are customer communications consistent and timely?
Conclusion
SBOMs provide visibility, but visibility alone does not reduce risk. VEX adds the context needed to prioritize action, align teams, and communicate clearly. When you integrate SBOM and VEX workflows into delivery and governance processes, vulnerability management becomes faster, more accurate, and easier to scale.
For manufacturers of connected products, that shift is becoming essential. Regulatory pressure is increasing, software supply chains are growing, and customers expect transparency. A structured operating model now gives you both resilience and readiness.
Is an SBOM mandatory under the Cyber Resilience Act?
The CRA increases expectations around documenting software components used in products with digital elements. In practice, an SBOM is the most efficient way to meet that need and support traceability. It also helps you maintain accurate records for audits, vulnerability response, and lifecycle management.
Does the Cyber Resilience Act explicitly require VEX?
The term VEX may not always be stated directly, but the need to assess, remediate, and communicate vulnerabilities is clear. VEX is a practical and scalable way to meet those expectations. It gives you a structured method for sharing exploitability status with customers, regulators, and internal teams.
What is the difference between SBOM and VEX?
An SBOM lists what software components are in your product. VEX explains whether known vulnerabilities affecting those components are relevant to your specific product. Together, they provide both transparency and decision-making context.
How does VEX reduce false positives in vulnerability management?
VEX helps you mark issues as not affected, fixed, or under investigation where appropriate. This reduces wasted effort on findings that do not create real product risk. It also allows engineering teams to focus on the vulnerabilities that require action first.
How can SBOM and VEX be integrated into CI/CD pipelines?
You can automate SBOM generation during builds, run vulnerability checks against released versions, and update VEX records as findings are assessed. This creates continuous evidence and faster response cycles. It also improves release readiness by embedding security processes into normal development workflows.
About Onekey
ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

CONTACT:
Sara Fortmann
Senior Marketing Manager
sara.fortmann@onekey.com
euromarcom public relations GmbH
team@euromarcom.de
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.



