Safeguard.sh Documentation Center
Enterprise Software Supply Chain Manager (ESSCM)

EO 14028 Compliance Checks

Executive Order 14028 compliance verification and reporting

EO 14028 Compliance Checks

Safeguard.sh automatically validates your SBOMs against Executive Order 14028 requirements, ensuring your software meets federal cybersecurity standards.

Overview

Executive Order 14028, "Improving the Nation's Cybersecurity," establishes requirements for software sold to the federal government. Safeguard.sh helps you:

  • Validate SBOM completeness against NTIA minimum elements
  • Verify secure software development practices
  • Generate compliance reports
  • Track compliance status over time

NTIA Minimum Elements

The NTIA defines minimum elements required in an SBOM:

Data Fields

ElementDescriptionStatus
Supplier NameEntity that creates, defines, and identifies componentsChecked
Component NameDesignation assigned to a unit of softwareChecked
VersionIdentifier used to specify a change from previous versionChecked
Other Unique IdentifiersOther identifiers (e.g., PURL, CPE)Checked
Dependency RelationshipCharacterization of the relationshipChecked
Author of SBOM DataName of the entity that creates the SBOMChecked
TimestampDate and time the SBOM was assembledChecked

Automation Support

RequirementDescriptionStatus
Machine-Readable FormatSPDX or CycloneDX formatValidated
Automated GenerationAbility to generate without manual interventionSupported
Automated ConsumptionAbility to ingest programmaticallySupported

Compliance Dashboard

View EO 14028 compliance status in the project dashboard:

Compliance Score

Each project receives a compliance score based on:

  • Data Completeness - Percentage of required fields populated
  • Format Compliance - Valid SPDX/CycloneDX structure
  • Component Coverage - All components have minimum data
  • Update Frequency - SBOM freshness

Compliance Status

StatusMeaning
CompliantMeets all EO 14028 requirements
⚠️ Partially CompliantSome requirements not met
Non-CompliantMissing critical requirements

Viewing Compliance Checks

Project Level

  1. Open a project from the Projects page
  2. Navigate to the Compliance tab
  3. View detailed compliance status

Organization Level

  1. Go to Dashboard
  2. View the EO 14028 Compliance widget
  3. See aggregate compliance across all projects

Compliance Report

Generate compliance reports for federal procurement:

Report Contents

  1. Executive Summary - Overall compliance status
  2. SBOM Details - Format, timestamp, author
  3. Component Analysis - Data completeness per component
  4. Gap Analysis - Missing or incomplete data
  5. Remediation Steps - How to achieve compliance

Generate Report

  1. Open project
  2. Click ExportEO 14028 Compliance Report
  3. Select format (PDF, HTML, JSON)
  4. Download report

CLI Generation

safeguard compliance report --project "my-app" --version "1.0.0" --format pdf --output eo14028-report.pdf

Common Compliance Issues

Missing Supplier Names

Problem: Components lack supplier identification

Solution:

  • Use package URLs (PURLs) which include supplier info
  • Manually add supplier data for proprietary components
  • Contact vendors for accurate supplier information

Incomplete Version Data

Problem: Components have vague or missing versions

Solution:

  • Use lock files to capture exact versions
  • Avoid version ranges in manifests
  • Pin dependencies to specific versions

Missing Unique Identifiers

Problem: Components lack PURLs or CPEs

Solution:

  • Generate SBOMs from source with modern tools
  • Enrich existing SBOMs with identifier lookup
  • Use Safeguard.sh enrichment features

Outdated SBOMs

Problem: SBOM timestamp is stale

Solution:

  • Enable continuous scanning
  • Configure webhooks for automatic updates
  • Set up scheduled SBOM generation

SSDF Alignment

Safeguard.sh also tracks alignment with the Secure Software Development Framework (SSDF):

PracticeDescriptionSupported
PO.1Security RequirementsVia policies
PS.1Protect SoftwareVulnerability scanning
PS.2Secure Development EnvironmentIntegration tracking
PW.4Source Code ReviewVia integrations
PW.6Verify Third-Party ComponentsSBOM analysis
RV.1Identify VulnerabilitiesContinuous scanning
RV.2Assess VulnerabilitiesRisk scoring
RV.3Remediate VulnerabilitiesAI Remediate

Attestation Letters

Generate attestation letters for federal customers:

  1. Go to ComplianceAttestations
  2. Select project and version
  3. Choose attestation template
  4. Review and sign
  5. Export signed attestation

Best Practices

For SBOM Generation

  • Generate SBOMs from source code when possible
  • Use CycloneDX 1.5+ or SPDX 2.3+ formats
  • Include lock files in source repositories
  • Automate SBOM generation in CI/CD

For Compliance

  • Review compliance status weekly
  • Address gaps before federal delivery
  • Keep SBOMs updated with each release
  • Document compliance processes

For Reporting

  • Generate reports for each major release
  • Archive reports for audit purposes
  • Include compliance reports in delivery packages
  • Maintain compliance history

Federal Procurement

When selling to federal agencies:

  1. Pre-Contract: Demonstrate compliance capability
  2. Contract Award: Provide initial SBOMs
  3. Ongoing: Supply updated SBOMs per contract terms
  4. Audit: Provide compliance reports on request

API Access

Access compliance data programmatically:

# Get compliance status
curl -X GET https://api.safeguard.sh/v1/projects/{id}/compliance/eo14028 \
  -H "Authorization: Bearer $API_KEY"

# Generate compliance report
curl -X POST https://api.safeguard.sh/v1/projects/{id}/compliance/report \
  -H "Authorization: Bearer $API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"format": "pdf", "standard": "eo14028"}'

Resources

Next Steps

On this page