Design a security program that builds trust, scales with your business, mitigates risk, and empowers your team to work efficiently.
Cybersecurity is evolving — Strike Graph is leading the way.
Check out our newest resources.
Find answers to all your questions about security, compliance, and certification.
Find out why Strike Graph is the right choice for your organization. What can you expect?
Find out why Strike Graph is the right choice for your organization. What can you expect?
SBOMs have become essential to medical device cybersecurity. Learn what SBOMs are, why they matter, and how to stay compliant. Explore the requirements and download our FDA-ready checklist to get started.
A medical device SBOM lists all of its software. It helps manufacturers, users, and regulators understand which software the device uses to operate and link with other systems. That, in turn, helps them find vulnerabilities and strengthen cybersecurity.
A software bill of materials (SBOM) is exactly what it sounds like — a software version of a traditional bill of materials that lists the parts in a manufactured product. SBOMs do the same thing for software: they tell anyone using the product what it’s made of and what vulnerabilities its software components may have.
In medical devices, the SBOM covers all the software the device uses to function or connect with other systems, such as electronic health records (EHRs), patient portals, cloud platforms, and connected tools.
The FDA and NTIA, the two agencies that interact to define SBOM requirements for medical device manufacturers, use the generic term “component” when describing SBOM entries, as do other official resources. In its foundational 2021 document “Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM),” the NTIA outlines basic SBOM elements and defines key terms. Here, they define components as “units of software defined by suppliers or authors.” In other words, it’s up to the SBOM author to decide what counts as a component. Still, it’s usually an individual software element — like a library, package, or tool — that works together with others to make the device function.
Key Takeaways
The FDA requires an SBOM for any “cyber device” — a medical device that has software and connects to the internet. Without it, the FDA won’t review the application, and the manufacturer can’t move forward with approval to sell the device.
In September 2023, the U.S. Food and Drug Administration (FDA) updated its cybersecurity guidelines for medical devices. As part of the update, the FDA officially began requiring SBOMs in premarket submissions for “cyber devices.”
This move reflected the industry’s growing focus on cybersecurity and the increasing connectivity of medical devices to systems like hospital networks and cloud-based servers. As a result, vulnerabilities in connected devices can affect not just the individual device but also the safety of patients and the stability of healthcare systems. SBOMs are just one part of the FDA’s broader effort to strengthen device cybersecurity as healthcare systems become more connected.
That means any medical device manufacturer that wants FDA approval for commercial use must include an SBOM and other required materials. The rule applies to all premarket submissions, including 510(k), 513, 515(c), 515(f), and 520(m) applications. This new requirement went into effect in October 2023 and put SBOMs in the spotlight for medical device makers.
Most SBOMs appear as machine-readable code, usually in JSON or XML. Conceptually, they look like a hierarchical tree — each branch is a software component with details like version, license, and known vulnerabilities. The structure stays the same, but the components vary by software.
Machine-readable SBOMs are the industry standard because computers can automatically scan and analyze them. In healthcare, common formats include SPDX, CycloneDX, and SWID. These formats may look complex to non-experts, but the key is the detailed software information they contain.
The National Telecommunications and Information Administration (NTIA) describes an SBOM as follows in the same 2021 document mentioned earlier: “An SBOM is effectively a nested inventory: a list of ingredients that make up software components.” The “nested” structure means that an SBOM doesn’t just list top-level software components — it also shows what those components rely on, and what those rely on, forming a multi-layered map of dependencies. That description can help visualize what information an SBOM contains and how it’s structured.
For example, the image below, from the same 2021 NTIA document, shows conceptual representations of how SBOMs organize components and the relationships between them. As the NTIA says, “these are conceptual representations and not specific formats like SPDX, CycloneDX, or SWID.”
The FDA requires SBOMs for “cyber devices”—medical devices with software, internet access, and cybersecurity risk. The SBOM must list all software: in-house, third-party, open-source, plus any other software that those components depend on.
In its final guidance, “Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions,” from September 2023, the FDA outlines its new cybersecurity requirements for premarket medical device applications. Here, the agency clearly states that “cyber devices” require an SBOM. These are a specific subset of devices that:
That means that manufacturers of devices that have software but don’t connect to the internet don’t need to submit an SDBOM as part of their application.
The FDA also specifies that the 2023 cybersecurity requirements do not apply to any application that a manufacturer submitted before March 29, 2023, or to previously authorized cyber devices. However, if the manufacturer needs to make a change to the device that requires a premarket review by the FDA, the 2023 cybersecurity requirements would apply, including the requirement to provide an SBOM for any cyber devices.
Although the requirements technically apply only to cyber devices, most medical device manufacturers already keep some form of an SBOM and may submit one even if it’s not a strict requirement. That’s because tracking your software has been a good practice among software producers for years.
"Requiring SBOMs in FDA submissions mostly formalizes a practice software teams already follow," says Micah Spieler, Chief Product Officer at Strike Graph.
Doug Shaw owner of DShaw Consulting LLC, reiterates this sentiment: “A lot of companies create SBOMs for devices that fall outside of the FDA’s ‘cyber devices’ requirement.” Shaw says that this is because for manufacturers, SBOMs are essential for security — they aren’t just a compliance checkbox. “Any device with software, whether it’s connected to the internet or not, can carry risk,” he says. “I’ve seen standalone lab instruments infected through something as simple as a USB drive.”
He continues, “If you’re thinking about your full risk profile, it makes sense to document software components across the board — even if the device isn’t technically a ‘cyber device’ under FDA rules. You can flag low-risk components or limited-access systems, but they should still be included. Otherwise, you’re leaving potential attack paths off the table.”
The FDA has both pre-market and post-market SBOM requirements. Premarket, manufacturers must include specific data fields, cover both in-house and third-party software, and list known vulnerabilities. Postmarket, they must monitor the software and update SBOMs as vulnerabilities change.
The FDA has both pre-submission and postmarket requirements for SBOMs. The pre-submission guidelines explain how to prepare your SBOM, what it must include, and how to present it. The FDA’s eSTAR submission template includes a cybersecurity section where manufacturers can upload or reference their SBOM as part of the application.
Once the FDA approves your device and you begin distribution, the postmarket guidelines apply. For SBOMs, the FDA requires ongoing monitoring for new threats and clear communication with users if you update the SBOM or identify a new vulnerability.
Here’s a closer look at the FDA’s SBOM requirements:
Premarket submission (What goes into the SBOM):
Post-market requirements (Updating and monitoring the SBOM)
The FDA guidance doesn’t explicitly require ongoing SBOM monitoring. However, it does mandate post-market surveillance of cybersecurity vulnerabilities and updates to affected software. Most experts agree that updating the SBOM — and notifying users of any changes — is necessary to meet these broader post-market obligations.
“Once your device is on the market, your cybersecurity obligations don’t stop,” explains Aude Chetwynd, owner of Technical and Professional Services LLC. Chetwynd has over 20 years of experience in the medical device industry, with extensive experience in implementing software development to help companies comply with regulations from agencies such as the FDA.
“In fact, your post-market plan needs to show how you’ll track new vulnerabilities, notify users, and deploy patches,” she says. “If you’re distributing kits to multiple customers, that includes having a reliable communication process — so when a security issue comes up, everyone gets notified if you change your SBOM.”
Chetwynd continues, “The post-market plan should reference the same cybersecurity framework you built during pre-market development. It’s a continuation, not a new start. You also need to track response metrics: how long it takes to identify a vulnerability, how quickly you notify customers, and how fast you implement a fix. That performance data goes into your annual report to the FDA.”
Download our free FDA SBOM Compliance Checklist to see exactly what your medical device SBOM needs to include.
The seven baseline attributes for a medical device SBOM give each software component a unique identity. They include an identifying code, timestamp, supplier name, and more. These fields show how components connect to each other, so users know exactly what software the device includes.
In its 2023 requirements, the FDA specifies that the SBOM must include “baseline attributes” that the NTIA identified in its 2021 document “Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM).” These are the details that must be in the SBOM, no matter the format. According to the NTIA, the purpose of these baseline attributes is to “identify components and their relationships.”
Here’s a table of the required data fields and their definitions, directly from the NTIA:
A comprehensive SBOM lists every piece of software that the device depends on to function. It also includes licensing information for each component. The SBOM should use a machine-readable format so manufacturers can easily update, manage, and scale it throughout the software’s lifecycle.
A standard SBOM with only baseline attributes includes the minimum required fields to identify software components, such as name, version, supplier, and unique identifiers. It also includes other information that the FDA requires, such as details about the level of support. This type of SBOM meets FDA premarket requirements for “cyber devices,” but only at the most basic level.
In contrast, a comprehensive medical device SBOM offers a full picture of all software components, their interdependencies, and additional information that supports risk assessment and lifecycle management. It typically appears in a machine-readable format and supports automation, traceability, and real-time response. It also includes SBOM best practices that go above and beyond the minimum requirements and allow for more advanced use cases.
Here’s what comprehensive medical device SBOMs should include and support:
Medical device makers use SBOMs to manage security risks, respond to incidents, and support software updates. Before release, they can assess vulnerabilities and reduce risk. After release, they can track threats, update devices, and notify users. SBOMs also help manage software licenses and protect intellectual property.
Here are some core medical device SBOM use cases:
SBOMs help improve cybersecurity, which is key to keeping patients safe in today’s connected healthcare systems. They let device makers and hospital IT teams find and fix problems faster and help stop security issues from spreading across systems.
The increasing connectivity of the healthcare sector has brought real benefits for patients — faster results, improved diagnoses, and more coordinated care. But as more patient data flows between medical devices and clinical software, cybersecurity threats have also grown. In its 2023 guidance “Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions,” the FDA writes:
“Cybersecurity incidents have rendered medical devices and hospital networks inoperable, disrupting the delivery of patient care across healthcare facilities in the U.S. and globally. Such cyber attacks and exploits may lead to patient harm as a result of clinical hazards, such as delay in diagnoses and/or treatment.”
For the FDA, SBOMs play a critical role in strengthening the healthcare ecosystem’s resilience to cyber incidents. SBOMs do more than support regulatory compliance — they offer tangible operational and clinical benefits:
Most medical device SBOMs use machine-readable formats, usually in JSON. The main standards are CycloneDX and SPDX. Some teams also use SWID tags to help track vulnerabilities. In rare cases, like when a small company submits a device with very few components, the FDA may accept a spreadsheet format instead.
Here's a list of the different formats for medical device SBOMs:
Download our sample SBOM to see what a medical device SBOM looks like in a simple spreadsheet
This fictitious example includes all the key fields — including version numbers, license info, and known vulnerabilities — so you can understand the structure at a glance.
Strike Graph’s SBOM Manager automatically scans your software components for known vulnerabilities, alerts you to new threats, and helps you document your response. It supports a key part of FDA compliance by keeping your SBOM up to date and making it easier to share changes.
Medical device teams need strong risk management and fast incident response. Strike Graph’s SBOM Manager helps strengthen your medical device cybersecurity by keeping your SBOM active and up to date, so you can meet FDA expectations and respond quickly to new threats.
The SBOM Manager automatically scans your software components every day, checking them against trusted vulnerability databases. When it finds a high or critical risk, it alerts you and recommends actions to update your SBOM or reduce the threat.
After you upload your SBOM, you’ll see a complete visual breakdown of your software tree and a summary of the vulnerabilities detected. With built-in integrations, you only need to upload your SBOM once. The system continues monitoring it for you.
Strike Graph’s SBOM Manager helps you stay compliant, act quickly, and turn your SBOM into a tool that strengthens your device’s security.
The security landscape is ever changing. Sign up for our newsletter to make sure you stay abreast of the latest regulations and requirements.
Strike Graph offers an easy, flexible security compliance solution that scales efficiently with your business needs — from SOC 2 to ISO 27001 to GDPR and beyond.
© 2025 Strike Graph, Inc. All Rights Reserved • Privacy Policy • Terms of Service • EU AI Act
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!
Fill out a simple form and our team will be in touch.
Experience a live customized demo, get answers to your specific questions , and find out why Strike Graph is the right choice for your organization.
What to expect:
We look forward to helping you with your compliance needs!