CISA and G7 Issue Joint Guidance for AI Software Bill of Materials to Boost Transparency

CISA and G7 Partners Release New Guidance for AI SBOMs

INFORMATIONAL
May 13, 2026
4m read
Policy and ComplianceRegulatoryCloud Security

Related Entities

Full Report

Executive Summary

In a coordinated effort to enhance the security and transparency of the artificial intelligence ecosystem, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with its counterparts in the G7 nations and the European Union, has released a new publication: "Software Bill of Materials for AI – Minimum Elements." This guidance extends the traditional concept of a Software Bill of Materials (SBOM) to the unique complexities of AI systems. It proposes a framework for documenting not just software components, but also critical details about AI models, training data, and infrastructure. The goal is to provide consumers of AI technology with the necessary information to assess risk, manage vulnerabilities, and understand the provenance of the AI systems they deploy.

Regulatory Details

The guidance is a non-binding consensus document developed by cybersecurity experts from Canada, France, Germany, Italy, Japan, the UK, the US, and the EU. It is not a formal regulation but is intended to serve as a foundational standard for the industry. It builds upon the established principles of SBOMs and adapts them for AI, recognizing that AI systems are a specialized form of software.

Key Supplemental Elements for AI SBOMs:

The guidance introduces seven "clusters" of information that should be included in an AI SBOM in addition to standard software components:

  1. Metadata: Basic information about the AI SBOM itself, such as author and timestamp.
  2. System Level Properties: A high-level description of the AI system's purpose and architecture.
  3. AI Model Properties: Details about the model, including architecture, parameters, and any fine-tuning.
  4. AI Dataset Properties: Information about the data used to train, test, and validate the model, including its source and any preprocessing steps.
  5. Infrastructure Information: Dependencies on hardware and cloud services required for the AI system to operate.
  6. Cybersecurity Measures: Information on security evaluations performed, such as red-teaming or vulnerability scanning.
  7. Performance Indicators: Metrics used to evaluate the model's performance and limitations.

Affected Organizations

This guidance will affect a broad range of organizations:

  • AI Developers and Suppliers: They will be expected to generate and provide AI SBOMs for their products.
  • Public and Private Sector Consumers: They will use AI SBOMs as part of their procurement and vendor risk management processes.
  • Regulators and Policymakers: They will likely reference this guidance in future regulations and standards.

Impact Assessment

The primary impact of this guidance will be to increase transparency and accountability in the AI supply chain. By providing a standardized "ingredients list," AI SBOMs will enable organizations to better understand the risks associated with the AI tools they use. This can help identify vulnerabilities in underlying components, detect potential data poisoning or model tampering, and make more informed decisions about AI adoption. In the short term, it will create new compliance and documentation overhead for AI developers. In the long term, it is expected to foster a more secure and trustworthy AI ecosystem.

Compliance Guidance

While adoption is voluntary, organizations should begin preparing for a future where AI SBOMs are standard practice:

  • AI Developers: Start building processes and tools to automatically generate AI SBOMs as part of the development lifecycle. Treat it as a core part of "secure-by-design" principles for AI.
  • AI Consumers: Begin incorporating requests for AI SBOMs into procurement contracts and vendor security questionnaires. Develop internal processes to ingest, analyze, and act on the information contained within them.
  • Security Teams: Familiarize yourselves with the new guidance. Plan how to integrate AI SBOM data into existing vulnerability management and application security programs. Use D3FEND's System File Analysis (D3-SFA) as a conceptual model for how to analyze the components listed in an SBOM.

Timeline of Events

1
May 12, 2026
CISA and G7 partners publish the 'Software Bill of Materials for AI – Minimum Elements' guidance.
2
May 13, 2026
This article was published

MITRE ATT&CK Mitigations

SBOMs directly support this mitigation by identifying all software components and their versions, making it easier to track and patch vulnerabilities.

AI SBOMs provide the transparency needed to analyze the configuration and components of AI systems to ensure they are securely configured.

Timeline of Events

1
May 12, 2026

CISA and G7 partners publish the 'Software Bill of Materials for AI – Minimum Elements' guidance.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AIArtificial IntelligenceSBOMsupply chain securityCISAG7transparency

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.