Skip to main content
Category

News

RECORDING: OpenChain Monthly Specification and Education Call (North America – Europe) – 2025-02-13

By News

Our February meeting of the Specification and Education Work Groups for North America and Europe covered four major topics:

  1. The current status of the freeze period for proposed updates to ISO/IEC 5230 and ISO/IEC 18974
  2. Potential future standardization work
  3. The recent release of the Capability Model for ISO/IEC 5230
  4. Next steps for the Education Work Group

Check out the Meeting Slides:

Watch the Recording:

Coming Next:

We will be following up on the activities outlined above on the mailing lists, and we will continue our regular series of calls and meetings throughout the year.

Join Our Work:

Everyone is welcome to be part of the Specification Work Group. You can join their mailing list here:
https://lists.openchainproject.org/g/specification/

You can find and be part of all OpenChain calls through our participation page here:
https://openchainproject.org/participate

SBOM Quality Considerations – OpenChain SBOM Study Group

By News

OpenChain is looking at the challenge of addressing policy implementation and information fidelity in SBOM. Suppliers provide different SBOM or document formats. Users need to consolidate them.

Example analysis from the Japan SBOM Sub-Group:

The OpenChain Japan SBOM Sub-Group has been conducting an analysis in Japanese. This is one of several discussions around the world, and it has been consolidated into a detailed document:

Mailing List of the global SBOM Study Group:

We are actively considering all aspects of SBOM Quality, and you are invited to be part of this via our global mailing list. Discussions happen here in English:

Full Analysis from Japan SBOM Sub-Group:

Shared Issues

  1. Lack of Accuracy in SBOM Information
    There is a lack of consistent and accurate information about package details such as package names, versions, and supplier names because different departments or providers use varying formats.
    • Differences in Package Name Notation
      Even for the same component, different vendors or departments might list slightly different names. For example, one company might mix the official name with abbreviations, include spelling mistakes, or vary between uppercase and lowercase letters, making it difficult for the recipient to consistently identify the component in the SBOM.
    • Differences in Version Information Notation
      For the same component, one source might list “1.0.0” while another might use “v1.0” or other formats, resulting in inconsistent version representations that can cause ambiguity.
    • Variations in Supplier Names
      Similarly, supplier names might vary. Official company names, abbreviations, or even outdated names that do not reflect mergers or acquisitions can be present, leading to an overall lack of consistency.
  2. Inconsistency of Component Granularity
    When receiving SBOMs from multiple suppliers, one SBOM might provide detailed information at the file level, while another might compile data at the package level. This inconsistency in granularity requires the recipient to normalize the data.
  3. Insufficient Source Information When Binaries Are Provided
    When receiving a binary along with its SBOM, detailed information about the source files (such as file listings, hash values, change histories, etc.) is often missing, making it challenging to manage vulnerabilities or assess risks.
    • Listing of Source Files
      A list detailing which source files are included in the component.
    • Hash Values of Source Files
      Hash values (e.g., SHA-256) for each file to prevent tampering and ensure integrity.
    • License Information
      Information about the license and copyright associated with each source file.
    • Patch or Diff Information
      Details on modifications or patches applied to the source code.
    • Build Environment and Configuration Information
      Data regarding the build environment, such as which compilers or build options were used.
    • Dependency Information
      Details about other libraries or components that this source code depends on.
  4. Lack of Integration with Vulnerability Information
    There are cases where the component or library information listed in the SBOM is not adequately correlated with known vulnerability information (such as security advisories, CVEs, or PSIRT reports).
    • Lack of Integration between SBOM and Vulnerability Databases
      Since there isn’t a consistent method to automatically link each SBOM entry (e.g., package name, version, supplier details) with subsequently discovered vulnerability information (for example, CVE numbers or vulnerability details), it becomes difficult to pinpoint which vulnerability affects which software component.
    • Inconsistency in Reporting Channels and Contact Points
      When vulnerability information is provided internally (via PSIRT or a security team) or externally, there is often a lack of clarity regarding where in the SBOM this information should be incorporated, or which department should handle it. This can delay communication and hinder prompt responses during vulnerability discovery and mitigation.
  5. Mismatch in Information Sharing and Coordination Between Upstream and Downstream
    There is often a disconnect between the SBOM provided by upstream vendors and the information managed by the manufacturer assembling the final product.
    • Use of Different Formats or Standards
      When the SBOM format or the security management standards of each company differ, it becomes challenging to uniformly interpret and reconcile the information, causing the assessment of risk or the need for countermeasures to rely heavily on individual discretion.
    • Disjointed Internal Processes
      If there is no routine process for information updates or feedback between the upstream vendor (providing the SBOM) and the downstream final product manufacturer or security team (handling vulnerability information), it can hinder early detection or impact evaluation of vulnerabilities.
  6. Unclear Accountability in Contracts or Internal Processes
    There is an issue over ambiguity regarding how much information should be requested within contractual obligations for SBOM provision, and who should be responsible (e.g., quality control or PSIRT) for addressing inquiries if internal communication processes are insufficient.
  7. Diversity in SBOM Formats and Standards
    Currently, multiple formats (SPDX, CycloneDX, JSON, Excel, etc.) exist without unified quality guidelines or evaluation criteria, resulting in variable judgment on the recipient side.
  8. Difficulty Ensuring the Trustworthiness of Altered SBOMs
    Sometimes the SBOM generated by a vendor is different from the one generated from an in-house build at the manufacturer. This discrepancy makes it challenging to assess the impact on vulnerability evaluation and risk management.
    • Lack of Transparency in the Modification Process
      When an SBOM is modified through several departments or tools after its initial generation, if the modification history or details are not adequately recorded or disclosed, it becomes difficult to verify whether the final SBOM matches the original source.
    • Risk of Human Error in Manual Modifications
      If the SBOM is manually corrected or supplemented, there is a high risk of input errors or inadvertent modifications, which can lead to divergence from the original, accurate information, compromising reliability.
    • Variability in Automatic Generation Processes
      When multiple automated tools or processes are involved in generating the SBOM, the differences in the output format or content among tools may inadvertently result in loss or alteration of information during integration or editing.
    • Overlooking of Vulnerability Information Due to Modifications
      Altered SBOMs might omit or edit crucial details regarding vulnerabilities or dependency information that should be included, leading to inadequate internal or external security assessments.
  9. Lack of Clear Definition for Additional Information Expected in an SBOM
    For example, there is no clear standard definition for the specific items (such as hash values, timestamps, or listings of source files) that should be included in the SBOM. This leads to each company providing different sets of information, further complicating subsequent analysis or vulnerability assessments.
  10. Insufficient Update Mechanisms and Contact Points
    When vulnerabilities are discovered, the absence or lack of a centralized contact point (such as a PSIRT department) and an effective communication mechanism regarding the SBOM information can cause delays in information transmission.
    • The checklist includes whether the SBOM is updated, including the display of update timestamps and a clearly indicated inquiry contact point.

Proposed Solutions and Automation Considerations:

  1. Lack of Accuracy in SBOM Information
    • Checkpoints
      • The way each component’s package name, version, and supplier details are recorded
      • Consistency in the notation of names and version formats
    • Proposed Solutions (Processes/Mechanisms)
      • Establish naming and versioning rules based on industry standards or internal guidelines
      • Introduce an automated validation system (using regular expressions, etc.) to verify these items during SBOM generation
      • Set up a process for periodic reviews to identify inconsistencies and provide feedback
    • Automation Feasibility
      • Automatable: Checks for naming conventions or version formats can be validated using dedicated scripts or tools.
      • Manual Verification: Ambiguous cases or new exceptions may require human review.
  2. Inconsistency of Component Granularity
    • Checkpoints
      • Identification of the granularity used in each SBOM (file level, package level, etc.)
      • Differences in the level of detail provided
    • Proposed Solutions (Processes/Mechanisms)
      • Clarify the “desired granularity” either industry-wide or internally, and adopt a unified format with corresponding guidelines
      • Build a conversion tool (intermediate tool) to normalize and standardize the granularity of the SBOM data received
    • Automation Feasibility
      • Automatable: It is possible to create parsers or conversion scripts that transform various SBOM formats into a unified one.
      • Manual Verification: In cases where the rules are complex, final verification might require human judgment.
  3. Insufficient Source Information When Binaries Are Provided
    • Checkpoints
      • Presence of a source file list
      • Availability of hash values for each source file
      • Inclusion of license and copyright information
      • Documentation of patches/differences and change histories
      • Records regarding the build environment, compilers, and build options
      • Dependency information
    • Proposed Solutions (Processes/Mechanisms)
      • Mandate the inclusion of the above details as required fields during SBOM creation
      • Enhance automatic generation tools or adjust settings to include source information in the SBOM
      • Introduce processes that automatically extract and append necessary details from build logs or static analysis tools
    • Automation Feasibility
      • Automatable: It is feasible to integrate build systems with extraction processes to automatically append the required information during SBOM generation.
      • Manual Verification: A final review by humans may be necessary to ensure complete coverage.
  4. Lack of Integration with Vulnerability Information
    • Checkpoints
      • The linking of each component’s version information to vulnerability databases (e.g., CVE, security advisories)
      • Documentation of contact points and update histories
    • Proposed Solutions (Processes/Mechanisms)
      • Develop a system that automatically correlates each SBOM entry with vulnerability information from relevant databases (e.g., through integration with vulnerability scanners)
      • Implement regular automated scans and an alerting system that ensures prompt action when vulnerabilities are detected
      • Clearly define and incorporate contact information within the SBOM for unified internal and external communication
    • Automation Feasibility
      • Automatable: Integration with vulnerability scanning tools and automated matching and alert systems can be programmed.
      • Manual Verification: Human oversight may be required to review alerts and determine the applicability of fixes.
  5. Mismatch in Information Sharing and Coordination Between Upstream and Downstream
    • Checkpoints
      • Discrepancies between the SBOM provided by vendors and the internally managed SBOM of the final product manufacturer
      • Existence of update histories, difference reports, or integration processes to confirm consistency
    • Proposed Solutions (Processes/Mechanisms)
      • Establish a common repository to aggregate SBOM information from both upstream vendors and downstream manufacturers
      • Introduce regular synchronization processes (for example, periodic cross-check meetings or automated comparison tools for updates)
      • Use format conversion tools based on a unified standard to automatically verify consistency
    • Automation Feasibility
      • Automatable: Tools for comparing differences or integrating information via standardized formats can be implemented for automatic update checks.
      • Manual Verification: Evaluation of particular discrepancies or context-specific information might ultimately require human review.
  6. Unclear Accountability in Contracts or Internal Processes
    • Checkpoints
      • Clarity on the scope of SBOM information provided and the designated responsible contact details
      • Documentation of responsibilities as per contractual agreements or internal rules
    • Proposed Solutions (Processes/Mechanisms)
      • Clearly state in contracts or SLAs what information is mandatory and who is responsible for it
      • Establish internal processes for escalation and inquiry handling, with documented contact points and periodic reviews
      • Embed inquiry management and update history functions directly into the SBOM system
    • Automation Feasibility
      • Automatable: For instance, recording contact information and update histories automatically on an SBOM system is achievable through programming.
      • Manual Verification: Contractual and organizational aspects may require document management and human oversight.
  7. Diversity in SBOM Formats and Standards
    • Checkpoints
      • Identification of the SBOM output format (e.g., SPDX, CycloneDX, JSON, Excel, etc.)
      • Presence of mandatory fields that should be shared across formats
    • Proposed Solutions (Processes/Mechanisms)
      • Adopt unified rules or conversion tools based on industry standards (such as SPDX or CycloneDX)
      • Build a “format normalization process” to convert each company’s SBOM to a common intermediate format and define clear evaluation criteria
    • Automation Feasibility
      • Automatable: Using conversion tools or format checkers, it is possible to automatically verify compliance with established standards.
      • Manual Verification: Exceptional cases or minor adjustments post-conversion might still require human review.
  8. Difficulty Ensuring the Trustworthiness of Altered SBOMs
    • Checkpoints
      • Availability of modification history, version control, or log information
      • Presence of digital signatures, hash values, or verification data to confirm authenticity
    • Proposed Solutions (Processes/Mechanisms)
      • Immediately after SBOM generation, attach a hash or digital signature to the original state so that any post-generation modifications can be detected
      • Implement a modification history management system (using version control, for example) and establish regular audit processes
      • Utilize automatic verification tools (for hash computation and signature verification) that ensure the SBOM’s integrity
    • Automation Feasibility
      • Automatable: Digital signatures and hash verification processes can be entirely automated using software tools.
      • Manual Verification: In some cases, audits or final checks may still require human review.
  9. Lack of Clear Definition for Additional Information Expected in an SBOM
    • Checkpoints
      • Whether the SBOM includes the additional required fields (hash values, timestamps, source file list, license information, etc.)
    • Proposed Solutions (Processes/Mechanisms)
      • Develop an industry-wide or internal checklist defining the mandatory metadata that should be included in an SBOM
      • Employ automated generation or static analysis tools to check for the presence of these essential details and trigger alerts if any are missing
      • Hold periodic reviews to evaluate and update the additional required items as needed
    • Automation Feasibility
      • Automatable: It is possible to build an automated validation tool based on a checklist of requirements.
      • Manual Verification: A human review might still be necessary to assess the thoroughness of these guidelines.
  10. Insufficient Update Mechanisms and Contact Points
    • Checkpoints
      • Inclusion of update history and the record of the latest update time in the SBOM
      • Presence and clarity of the designated inquiry contact details
    • Proposed Solutions (Processes/Mechanisms)
      • Build a workflow that regularly updates the SBOM information and automatically notifies relevant parties when changes occur
      • Mandate the inclusion of inquiry contact information in the SBOM, and integrate it with a dedicated contact management system (such as a helpdesk or chatbot)
      • Document the inter-department communication rules regarding updates and establish internal audit processes
    • Automation Feasibility
      • Automatable: Update history management, notification systems, and automatic linking to inquiry contacts can be achieved with dedicated tools.
      • Manual Verification: Evaluation of inquiry responses or the appropriateness of updates might ultimately require human oversight.

S-Core Strengthens Open Source Compliance With ISO/IEC 5230

By Featured, News

S-core, Self-Certified for OpenChain ISO/IEC 5230 International Standard

S-core has officially obtained the OpenChain ISO/IEC 5230 certification, a globally recognised standard for open source compliance. This certification acknowledges the reliability and transparency of S-Core’s open source management system on an international scale.

OpenChain ISO/IEC 5230 is an open source compliance management standard created by The Linux Foundation’s OpenChain Project and published by the International Organization for Standardization (ISO). It provides guidelines to help companies effectively manage open source and mitigate legal risks.

Open Source Specialist S-core’s Journey

S-core is a company that specializes in open source services, leveraging its extensive experience in open source-based infrastructure development.

This company offers full-care service for open source use, from open source adoption, migration, technical support, to governance consulting in order to help customers establish management systems for safe and strategic use of open source.

It has recently strengthened its capability of open source compliance to deliver more reliable and secure services to customers by aligning its open source management system with OpenChain ISO/IEC 5230.

Internally, a dedicated team continuously reviews licenses, assesses risks and operates in-house training programmes to ensure developers use open source correctly. Additionally, S-core has implemented a structured system using open source management tools to proactively identify and mitigate potential risks throughout the development process.

Sunghan Suh, Head of the Open Source Business Division at S-core, stated, “Open source has already become fundamental components in software development and operation across all industries.” He added, “With the acquisition of the OpenChain certification, we will take the lead in the development of the open source ecosystem to enable companies and developers to use open source more safely and efficiently by sharing our extensive expertise accumulated from adoption, development, operation, management to technical support.”

S-core’s Future Efforts

S-core plans to obtain ISO/IEC 18974 certification to further enhance open source security management, reinforcing its ability to address open source vulnerabilities. Looking ahead, the company aims to commit to the growth and development of the open source ecosystem with continued innovation and progress.

COMING SOON: Building New Open Source Standards – A Playbook for 2025 @ LF Member Summit – 2025-03-19

By News

The OpenChain Project will be delivering a major talk for the open source ecosystem at the LF Member Summit in March. This is a “lessons learned” talk to help everyone understand how to build and deliver open standards to the community.

Talk Abstract:

The OpenChain Project has built two open source process management standards (ISO/IEC 5230 and ISO/IEC 18974) and deployed them across the open source supply chain. While OpenChain was the first Linux Foundation project in 14 years to produce an ISO standard, it is far from the last.During the 2023~2024 period, we saw growing engagement around Joint Development Foundation and committee discussions around standards or specifications in other LF projects.

This talk will consolidate OpenChain’s lessons learned in creating, submitting and deploying open source standards. It will help projects at any stage in the development lifecycle of specifications, including those only just considering this option for long-term impact. It will also help people with a specific interest in a more trusted supply chain to get more involved in OpenChain, building on our existing work or participating in new potential standards.

Our optics will be on the legal, risk and compliance side due to the nature of the OpenChain Project’s mission for a more trusted supply chain, but the core material will be equally applicable to technical, code or other projects working on this topic.

Learn More:

OpenChain and Friends – Stuttgart – 2025-04-7 ~ 2025-04-09

By News, unlisted

Registration is required for this free event /
kostenlose Veranstaltung, aber Registrierung ist erforderlich

OpenChain and The FOSS-LÄND Community Invite You To An Information Exchange

Want to get better at Open Source?

Open Source offers significant advantages for businesses, but effectively managing it with your developers, vendors, or within your software supply chain can be challenging. Whether you are new to the topic or a seasoned expert in open source management, we invite you to join us from April 7 to 9 in Stuttgart for a share and learn event. During this event, you will have the opportunity to:

  • Hear from industry peers as they share their open source processes and best practices.
  • Experience demonstrations from tool creators showcasing automated compliance solutions.
  • Participate in technical sessions focused on overcoming common challenges in the field.
  • Discover available support options from both the community and government resources.

OpenChain und The FOSS-LÄND Community laden zum Open Source Austausch ein

Wollen Sie die Open Source Reife Ihrer Organisation verbessern?

Open Source bietet allerhand Vorteile, aber ein effektives Open Source Management im Spannungsfeld zwischen Entwicklern, Zulieferern oder generell in der Software Lieferkette kann eine Herausforderung sein. Ob Sie nun neu in dem Thema sind oder schon langjährige Erfahrung haben, wir laden Sie vom 7. bis 9.April nach Stuttgart ein, um uns gegenseitig dazu auszutauschen und dazuzulernen. In unserem Event werden sich folgende Gelegenheiten bieten:

  • Einblick in Open Source Prozesse anderer Organisationen und deren Erfahrungsberichte
  • Überblick über frei verfügbare Open Source Automatisierungs-Tools zum korrekten Umgang mit Open Source inkl. Demonstrationen durch deren Entwickler
  • Ausblick auf mögliche Lösungsräume zu geläufigen Open Source Management Herausforderungen durch Teilnahme an technischen Austausch-Runden
  • Durchblick zu den vielfältigen Unterstützungs-Angeboten, die sich durch die Open Source Community im Allgemeinen und durch „The FOSS-LÄND“ für Baden-Württemberg im Besonderen ergeben.

Schedule and Locations / Ablauf und Veranstaltungsorte

Day 1 – 7th April 2025

13:00-19:00: Afternoon Meeting @ Venue 1

FORUM Haus der Architektinnen und Architekten (HdA)
(See “Venue and Travel” below for details)

19:30-21:00: Informal Socializing Event

Location to be announced / Veranstaltungsort wird noch bekanntgegeben

Day 2 – 8th April 2025

08:00-16:45: Full-Day Meeting @ Venue 1

FORUM Haus der Architektinnen und Architekten (HdA)
(See “Venue and Travel” below for details)

Day 3 – 9th April 2025

08:00-16:45: Full-Day Meeting @ Venue 2

Bosch Digital | Lb079 (Halle 8)
(See “Venue and Travel” below for details)

Program / Programm

Day 1

TimeLobby / HalleRoom 1 / Raum 1Room 2 / Raum 2
12:30-13:00Registration
13:00-13:15Welcome and Introduction
13:15-13:45Establishing trusted and consistent open source management across the supply chain with the OpenChain ISO standards​
13:45-14:30The FOSS-LÄND and TODO Group – helping you with Open Source​
14:30-15:00Meet the experts – Introduction to the marketplace
15:00-15:30Break and Marketplace
15:30-19:00Communities and Good practices
Open Source from an SME perspective
Open Source aus der KMU Perspektive
Boot-Camp?

19:00 Joint walk to the restaurant

19:30 Socializing Event

Day 2

TimeLobby / HalleRoom 1 / Raum 1Room 2 / Raum 2
7:30-8:00Registration
8:00-8:10Welcome and Introduction to Process Track
Open Source as business – the ecosystem and chances for SMEs
Open Source als Geschäftsmodell – Chancen für KMUs im Ökosystem
Welcome and Introduction to Tooling Track
The Open Source Tooling Portfolio for the Software Supply Chain
Das Open Source Tool Portfolio für Software Lieferkette
Updates and OutlookUpdates and Outlook
8:10-9:30Process Track – Session 1
* Open Source as business
* Upstream orientation
* Examples for SMEs in Open Source business
* Business context influence
* The different dimensions of Open Source Managemen
Tooling Track – Session 1
* How to find Open Source solutions for your problem?
* Digital sovereignity, community health and ways to support
* Community Editions and commercial services
* Open Source portfolio and feature alignment
9:30-10:00Break and MarketplaceBreakBreak
Workshops Use Cases
As a < WHO >, I want < WHAT > so that < WHY > – 
updating and refining the user stories based on the latest non-functional requirements
Workshops Architecture
Common view on and wording for building blocks and capabilities
10:00-12:00Process Track – Session 2Tooling Track – Session 2
12:00-13:00Break and MarketplaceBreakBreak
Workshops Blueprints
Matching Problem Spaces to blueprints supported by the Open Source Tool Portfolio
Workshops Toollist
Updating and refining the Open Source Toollist
13:00-14:30Process Track – Session 3Tooling Track – Session 3
14:30-15:00Break and MarketplaceBreakBreak
Workshop SummariesTool Insights
15:00-16:45Process Track – Session 4Tooling Track – Session 4

Day 3

Community-led Unconference / Hackathon​

TimeRoom 1 / Raum 1Room 2 / Raum 2
8:30-9:00Registration
9:00-16:00Session 1Session 2
Unconference / Hackathon Summaries
16:00-16:45Common Ending

Please provide and discuss the topics for the Unconference / Hackathon on the Tooling Group mailing list: https://groups.io/g/oss-based-compliance-tooling

Venue and Travel

Venue 1 – Forum Haus der Architekten

Forum Haus der Architektinnen und Architekten

FORUM Haus der Architektinnen und Architekten (HdA)
Danneckerstraße 54
70182 Stuttgart, Germany
https://www.akbw.de/kontakt/anfahrt

Distance to the airport: 12 kilometers / Public Transport 35-45 Minutes

Venue 2 – Bosch Digital | Lb079 (Halle 8)

Forum Haus der Architektinnen und Architekten

Bosch Digital | Lb079 (Halle 8) 
Groenerstraße 5/1, 71636 
Ludwigsburg, Germany

Please use the entrance from the Schwieberdinger Straße – behind the petrol station. Address for the navigation is Schwieberdinger Str. 70/1, 71636 Ludwigsburg.
Bitte nutzen Sie den Eingang von der Schwieberdinger Straße – hinter der Tankstelle. Die Adresse fürs Navi ist Schwieberdinger Str. 70/1, 71636 Ludwigsburg .

Distance to the airport: 40 kilometers / Public Transport 1 Hour 10 Minutes

Example Lodging Options in Stuttgart

We do not have contracted rooms at these properties and cannot guarantee rates or availability.

Hotel Motel One Stuttgart-Mitte

Close to the Stuttgart Main Station
Distance to venue 1: 2 kilometers / 26 Minutes Walk / Public Transport 16 Minutes 5 Stopps
Distance to venue 2: 16 kilometers / Public Transport 35 Minutes via S-Bahn
Lautenschlagerstraße 14, 70173 Stuttgart
+49 711 300209-0

Hotel Unger Stuttgart

Close to the Stuttgart Main Station
Distance to venue 1: 2,1 kilometers / 28 Minutes Walk / Public Transport 16 Minutes 5 Stopps
Distance to venue 2: 16 kilometers / Public Transport 35 Minutes via S-Bahn
Kronenstr. 17, 70173 Stuttgart
+49 711 20990

Connections to Essen for the FSFE Legal Workshop

For participants attending the FSFE Legal Workshop in Essen from the 9th of April, we will end Day 2 of our event at 16:45 on the 8th of April. This will allow for easy train connections to Essen. Here is a link to the train connections from Venue 1 to Essen via Stuttgart Main Station.

Q&A

  • Who is the target audience of this event?​
    • Software developers, security professionals and OSPO representatives​
  • What the event location?​
    • Day 1& 2 – Haus der Architekten in Stuttgart, Day 3 – Urban Harbor Ludwigsburg​
  • What is the content about?
  • Can I already express my interest to join the event?​
  • Do I need to purchase a ticket?​
    • No, this is a free event but you are required to register for a ticket​
  • Is this a Linux Foundation event?​
    • This is a community event co-hosted by the Linux Foundation’s OpenChain Project, and it will adhere to the Linux Foundation’s policies and code of conduct​
  • Is the event language english?​ / Ist die Veranstaltungssprache englisch?
    • Yes, as we will have international participants, we plan to have english as event language, but for specific sessions we can also discuss to provide it in german (e.g. for people new to the topic) / Ja, wir haben internationale Teilnehmer, daher planen wir mit Englisch als Veranstaltungssprache. Aber wir können uns auch vorstellen bei entsprechendem Bedarf spezifische Themen (z.B. Themen für regionale Teilnehmer, die im Thema neu sind) auch in Deutsch / Schwäbisch 😉 zu machen.
  • Target group is also SME / KMU – is this acc. to KMU 2003/361 with < 250 employees?
    • Concerning the event we would welcome also bigger companies but want to explicitly support the small and medium businesses with the content. Only the concrete The FOSS-LÄND offerings (e.g. vouchers/Beratungsgutschein etc.) are explicitly for SME / KMU in the region, see details in german only: https://www.transformationswissen-bw.de/beratung/beratungsgutschein
  • CRA and NIS2 would be expected as topics & Will the new Software Product Liability Act be a topic?
    • We are currently collecting proposals from all sides (see question about content above with link to the topic backlog). The general questions about What and Why will be addressed in the opening presentation. You can also join the mailing list to pre-discuss the contents for the workshops/round-tables: https://groups.io/g/oss-based-compliance-tooling
  • Is this event limited to the automotive supply chain only?
    • Via OpenChain we are open to more interested parties along other supply chains but want to explicitly support the small and medium businesses in the automotive supply chain (The FOSS-LÄND target group) in the region with the content. If there is bigger interest we can think about a follow-up in an extended setup., please feedback on the mailing-list https://groups.io/g/oss-based-compliance-tooling
  • Is the Process Stream focussed on Software Development Processes?
    • While the process stream was originally meant for OSPO and Open Source Management Processes in the supply chain, the Software Development Process perspective may become relevant for the mapping of blueprints around tooling and the automated handling of non-functional requirements.
  • Will there also be a “Community Stream” e.g. how to collaborate in communities, how to get your OSS project big?
    • There will be two sections in the target groups: A) new to the topic/management and B) advanced/experts => for the second section such a “Community Stream” could be covered e.g. by TODO Group and Good Governance Initiative contributions. Contributions are welcome, see “content question” above with the link to the topic-backlog.

COMING SOON: OpenChain @ AGL All Member Meeting – 2025-02-26

By News

OpenChain is part of the fabric of quality open source process management. During the Automotive Grade Linux All Member Meeting in Tokyo, we will discuss how our ISO process standards – ISO/IEC 5230 and ISO/IEC 18974 – support technology management activities in Japan and beyond.

“Grab a beverage and food at the AGL Showcase then sit down and learn how AGL and the Linux Foundation can help you gear up your company’s OSPO. Join a special event that will be mostly conducted in Japanese for companies to learn more about OSPO activities within the AGL OSPO Expert Group. This will include presentations from OEM OSPO leaders at Toyota and Honda, OpenChain, and AGL leadership and much more. Afterwards, stick around and talk to AGL developers about what is happening on the project during the AGL Showcase.”

– 17:15-17:25 OSPO Introduction by HONDA
– 17:25-17:35 OSPO Introduction by TOYOTA
– 17:35-17:45 AGL Introduction by Dan Cauchy
– 17:45-17:55 AGL OSPO-EG introduction
– 17:55-18:05 break
– 18:05-18:15 OpenChain Introduction
– 18:15-18:25 OpenChain Japan Introduction
– 18:25-18:35 Civil Infrastructure Project Introduction
– 18:35-18:45 Discussion & QA

Learn More on the AGL Event Page:

RECORDING: OpenChain AI Work Group – Monthly Workshop for North America and Europe – 2025-02-04

By News

We held our regular workshop for the OpenChain AI Work Group this week. It was a two-hour session to allow topics related to AI compliance to be discussed, explored and defined. The key focus for the Work Group is to develop and finalize a Guide to AI Bill of Material Compliance in the Supply Chain, and there is active drafting going on during each meeting.

The Draft Guide:

Watch the Recording:

Track This Work:

You can follow and contribute to the work of the OpenChain AI Work Group through its dedicated mailing list. This is open to everyone regardless of industry vertical or speciality. You will find it here:

Attend Future Meetings:

You can find and get the dial-in details for all future AI Work Group meetings from our participate page here:

Netcore Cloud is the latest company to announce an OpenChain ISO/IEC 18974 Conformant Program

By Featured, News

Netcore Cloud is the latest company to announce adoption of OpenChain ISO/IEC 18974, the international standard for open source security assurance.

“We are pleased to see a diversity of companies adopting ISO/IEC 18974,” says Shane Coughlan, OpenChain General Manager. “Our goal was always to create and support improved trust across the supply chain regardless of industry, and Netcore Cloud is an example of this in action. We look forward to next steps together in helping even more of the supply chain understand the need for and benefit of process standards for managing open source technology.”

About Netcore Cloud

Netcore Cloud is a global MarTech product company that helps B2C brands create amazing digital experiences with a range of products that help in acquisition, engagement, and retention. The first and leading AI/ML-powered marketing automation and customer engagement platform, Netcore Cloud was established in 1997 by Rajesh Jain, an internet pioneer. Today Netcore Cloud is revolutionizing the way marketing & product teams engage with the consumers.

Learn more at: https://netcorecloud.com/about-us/

About the OpenChain Project:

The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs.

About The Linux Foundation:

The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

The Erlang/OTP Project Announces an OpenChain ISO/IEC 5230 Conformant Program

By Featured, News

The Erlang Ecosystem Foundation has set goals for 2025 of raising the community infrastructure, processes and tooling profile to accommodate the latest industry standards for supply chain and cybersecurity. The Erlang/OTP team is thrilled to announce that the Erlang/OTP project now are conformant to OpenChain ISO/IEC 5230, the international standard for open source license compliance. The team would like to extend their thanks to EEF staff and community, the OpenChain community, and Ericssons Open Source Program Office for their support in getting to this point.

Erlang/OTP is an open source programming language made for programming concurrent, distributed, and fault-tolerant systems. The language is more than 30 years old, and has had 1,000s of contributions. By being OpenChain ISO/IEC 5230 conformant, we can build confidence among our ecosystem that Erlang/OTP manages licensing effectively, and has processes in place to do this in a sustainable way.

About Erlang:

Erlang is a programming language originally developed at the Ericsson Computer Science Laboratory. OTP (Open Telecom Platform) is a collection of middleware and libraries in Erlang. Erlang/OTP has been battle tested in a number of Ericsson products for building robust fault-tolerant distributed applications, for example AXD301 (ATM switch). Main developer and maintainer is the Erlang/OTP unit at Ericsson.

erlang.org

The source code for this webpage is available on GitHub. It is built using ErlangJekyllBootstrap 5 and Node.js.

License

Since OTP 18.0, Erlang/OTP is released under Apache License 2.0. The older releases were released under Erlang Public License (EPL), a derivative work of the Mozilla Public License (MPL).

About the OpenChain Project:

The OpenChain Project has an extensive global community of over 1,000 companies collaborating to make the supply chain quicker, more effective and more efficient. It maintains OpenChain ISO/IEC 5230, the international standard for open source license compliance programs and OpenChain ISO/IEC 18974, the industry standard for open source security assurance programs.

About The Linux Foundation:

The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure, including Linux, Kubernetes, Node.js, ONAP, PyTorch, RISC-V, SPDX, OpenChain, and more. The Linux Foundation focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

The OpenChain Explainers Reach General Release

By News

Background

The OpenChain Project provides ISO standards to help ensure open source is professionally managed, and to build increased trust across the open source supply chain. One important aspect of our work is explaining why this is beneficial to different teams in an organization.

What is Happening?

Today, we take a significant step forward to support better understanding of OpenChain open source process management standards by releasing “Explainers” for different teams in organizations. These have been released as CC-0 (effectively public domain) to help companies around the world benefit from adoption best practices for building trusted compliance programs.

These Explainers were developed by Andrew Katz from Orcro, Martin Yagi from First Light Fusion and the rest of the community of contributors who make up the OpenChain Education Work Group.

Get the Explainers

We host the Explainers in our Reference Library in GitHub. You can find them in a dedicated directory called “Education-For-Internal-Teams.”

Access and download them here:
https://github.com/OpenChain-Project/Reference-Material

You can also open GitHub issues with ideas, suggestions and bug-fixes:
https://github.com/OpenChain-Project/Reference-Material/issues

Contribute to Further Development

The Explainers were developed by the OpenChain Education Work Group after initial work through the OpenChain UK Work Group. You can participate in further development by joining the Education Work Group mailing list:
https://lists.openchainproject.org/g/education

You can also join our monthly call by checking out the calendar on our participation page:
https://openchainproject.org/participate

Please Note

This is reference material to help inspire understanding about the value of OpenChain open source process management standards for teams across organizations. It is not designed to be (a) legal advice, (b) assured to work in your context or (c) replace internal or third-party professional support and advice.