AI Bill of Materials (AIBOM) Guide for Enterprise AppSec
An AI Bill of Materials (AIBOM) is the inventory document that lists every model, dataset, framework, library, weight, embedding store, and runtime component that produces an AI system, the version and provenance of each, and the relationships between them. As the EU AI Act enters its phased application window, as NIST AI RMF and ISO/IEC 42001 land in enterprise GRC, and as procurement clauses from regulated buyers start asking for AI equivalents of the EO 14028 SBOM, the AIBOM has become the artefact that turns shadow-AI adoption into something an AppSec, product security, ML platform, vulnerability management, or GRC team can actually audit. This guide explains what an AIBOM is, how it differs from a classical SBOM, how CycloneDX ML-BOM and SPDX 3.0 AI Profile compare, how model cards and dataset cards sit alongside, the signals an AIBOM consumes, the audit-read against the EU AI Act, NIST AI RMF, ISO/IEC 42001, and OWASP LLM Top 10, and a phased rollout that does not require ripping out the model registry.
What an AIBOM Actually Is
An AIBOM is a structured, machine-readable inventory of the components that compose an AI system. Components in this context are broader than the libraries a classical SBOM lists: an AIBOM captures the model artefact itself (architecture, parameter count, checkpoint hash), the training datasets and their licences, the fine-tuning datasets and any RLHF or DPO post-training, the embedding store and its index strategy when the system uses retrieval-augmented generation, the inference framework and runtime version, the model server and its quantisation parameters, the surrounding agent or orchestrator stack, the tool catalogue available to an agentic system, the guardrail or policy layer applied at inference, and the dependency relationships that link these pieces back to the deployed AI feature.
The reason an AIBOM exists as a defined artefact, rather than a generic JSON dump from an ML platform, is that the AI supply chain is recursive in ways the classical software supply chain is not. A first-party fine-tune sits on top of a third-party base model, which was pre-trained on web-scale data with unclear licensing, which itself uses a transformer architecture and a tokeniser shipped by a separate maintainer, and the inference framework that loads the checkpoint sits inside a container that pulls CUDA and cuDNN dependencies from yet another supplier. An AIBOM written to a defined standard is how a buyer, an integrator, an internal AppSec team, or a regulator walks the AI dependency graph quickly and decides whether a newly disclosed model vulnerability, training-data takedown, or licence dispute applies to the system they are operating.
An AIBOM is not a model evaluation report and it is not a red-team finding list. It does not say which prompts jailbreak the model, whether the model leaks PII at temperature zero, or whether the agent invokes the wrong tool when adversarially nudged. An AIBOM tells you what is in the system. The risk picture comes from running the AIBOM against a model-vulnerability data source (Hugging Face advisories, vendor model security pages, OSV-style ML advisory streams as they mature) and from layering the model card, the dataset card, the OWASP LLM Top 10 testing record, and the AI red-team output on top. The AIBOM is the inventory. The signals sit beside it.
AIBOM vs SBOM: Where the Two Documents Diverge
An AIBOM is sometimes described as an SBOM for AI, and that framing is partly correct. Both documents are inventory artefacts. Both are machine-readable. Both are produced as a side-effect of a build or release process. Both are consumed downstream by vulnerability management, audit, and procurement. The same NTIA-style minimum-elements intent that shaped SBOM uptake under EO 14028 is shaping the AIBOM conversation under the EU AI Act and the OMB memos that follow CISA Secure by Design. The continuities are real.
The discontinuities are also real, and they matter for the operator. An AIBOM captures data-side components that have no SBOM analogue. A training dataset is not a library: it has provenance, licensing, sensitive-data categorisation, and a lifecycle that can survive multiple model versions. A fine-tuning corpus may be derived from customer data with regulatory implications a library never carries. A model checkpoint is not a package: it has weights that can be analysed for memorisation, watermarked for provenance, and copied without leaving package-manager traces. An embedding store is not a dependency: it is a runtime corpus that affects the model behaviour without appearing in any classical lockfile. The AIBOM has to capture all of these.
What an SBOM captures well
- Software components, versions, suppliers, hashes, package URLs.
- Dependency relationships between libraries.
- Licence metadata on each library.
- Build-time provenance when paired with SLSA attestation.
- CVE-readable identifiers for vulnerability matching.
What an AIBOM adds on top
- Model artefact identity (architecture, parameters, checkpoint hash).
- Training and fine-tuning dataset references with licence and provenance.
- Tokeniser and quantisation parameters that change behaviour.
- Embedding store, retrieval index, and corpus snapshot identity.
- Inference runtime, guardrail layer, and agent tool catalogue.
- Evaluation results and model card pointer for documented behaviour.
An AIBOM is the strict superset of an SBOM when the system in question is an AI feature. The dependency libraries the classical SBOM captures still need to be there because the inference server, the tokeniser, the orchestrator framework, and the surrounding agent stack are all classical software. The model, the data, the embeddings, and the runtime policy layer extend that inventory with the components that make the system AI. Our SBOM guide covers the software-side inventory in detail and is the right starting point for any team approaching AIBOM through the SBOM door.
CycloneDX ML-BOM and SPDX 3.0 AI Profile
The two dominant machine-readable AIBOM formats are CycloneDX ML-BOM (the ML-BOM extension to CycloneDX, introduced in CycloneDX 1.5 and matured in subsequent releases) and the SPDX 3.0 AI Profile (introduced as part of the SPDX 3.0 release that split the specification into modular profiles). Both formats meet the broad AIBOM intent of capturing model, data, and runtime components in a single inventory. Both are widely referenced in the AI assurance and AI Act technical-documentation discussion. Choosing between them is not a moral question; it is a question of which fits your existing SBOM tool chain, your buyer expectation, and your regulator alignment.
CycloneDX ML-BOM
- OWASP-stewarded. Origin in AppSec and application-security tooling.
- ML-BOM extension lives inside the same CycloneDX document as the SBOM.
- Components support a machine-learning type with model-specific properties.
- First-class VEX support for asserting model-vulnerability non-exploitability.
- Strong tooling alignment with existing SCA pipelines.
- JSON, XML, and Protocol Buffers serialisations available.
SPDX 3.0 AI Profile
- Linux Foundation-stewarded. SPDX is standardised as ISO/IEC 5962.
- AI Profile sits beside Build, Security, and Lite profiles in SPDX 3.0.
- Explicit fields for training data, model purpose, and intended use.
- Easy to cite in regulated procurement that already names ISO/IEC 5962.
- JSON, YAML, and tag-value serialisations defined.
- Stronger alignment with model card and dataset card semantics.
A reasonable default for an AppSec-led programme that already runs CycloneDX SBOMs and VEX through an SCA pipeline is CycloneDX ML-BOM. The ML-BOM extension produces a single document that covers both the classical libraries and the AI components, which means the existing ingestion pipeline does not need a parallel path. A reasonable default for a regulated-procurement-led programme that cites ISO/IEC 5962 or that aligns its model documentation to model card and dataset card patterns is SPDX 3.0 AI Profile. The AI Profile inherits SPDX 3.0's explicit fields for intended use and training data, which map cleanly onto EU AI Act Annex IV technical-documentation expectations.
Many enterprise programmes generate both for the same artefact and let the consumer pick, in the same way mature SBOM programmes generate both SPDX and CycloneDX. The format choice is downstream of the underlying data capture: as long as the generator is recording the model identity, the dataset references, the dependency graph, and the runtime configuration accurately, converting between CycloneDX ML-BOM and SPDX AI Profile is a transformation, not a regeneration.
Model Cards and Dataset Cards: The Companions to the AIBOM
An AIBOM is a structured inventory. A model card is a structured narrative. The two documents complement each other and an AI assurance pack typically requires both. The AIBOM tells a consumer what is inside the system at a precise technical level. The model card tells a consumer what the system is meant to do, what it was evaluated for, and where it is known to perform poorly. Together they let a downstream operator answer both the inventory question (what are we running) and the behaviour question (what is it supposed to do, and how does it behave).
The original model card pattern, published in 2018 by Mitchell et al. and adopted in slightly different forms by Hugging Face, Google's Model Card Toolkit, and various vendor model registries, captures intended use, factors and metrics, evaluation data, training data, quantitative analyses, ethical considerations, and caveats. The dataset card pattern, sometimes called a datasheet, captures the dataset motivation, composition, collection process, preprocessing, intended uses, and distribution. Both are pointer artefacts: they sit at a stable URL or registry path that the AIBOM references.
AIBOM
Machine-readable inventory of the model, data, framework, runtime, and surrounding stack. Parsed by tooling. Versioned per build.
Model card
Human-readable description of the model, its intended use, evaluation metrics, known failure modes, and ethical considerations. Referenced by the AIBOM.
Dataset card
Human-readable description of the training or evaluation dataset, its composition, collection process, and recommended uses. Referenced by the AIBOM.
Evaluation record
The pass-fail or score record from benchmark runs, OWASP LLM Top 10 testing, red teaming, and bias evaluation. Cited from the model card and linked to the AIBOM.
The audit-read benefits when the AIBOM references the model card and dataset card by stable URI rather than embedding the narrative. The model card and dataset card can evolve at their own cadence; the AIBOM pins the version of those documents that applied to a specific build. The combination produces a four-document pack: AIBOM, model card, dataset card, evaluation record. That pack maps cleanly onto the technical-documentation expectations of Annex IV of the EU AI Act and the documentation guidance in NIST AI RMF and ISO/IEC 42001.
The Signals an AIBOM Captures
An AIBOM is only useful if it captures the signals a downstream operator needs to make decisions. The defensible signal set has six layers. Programmes that try to skip a layer usually find the gap when a regulator, a buyer, or an incident asks them to prove something the missing layer would have answered.
Model identity
Architecture (transformer, diffusion, encoder, decoder), parameter count, checkpoint hash, quantisation, supplier, version, licence. The hash is what lets a buyer prove the model running today is the model that was evaluated.
Training and fine-tuning data
Dataset name, version, licence, sensitive-data classification, source, collection date, transformations applied. Includes RLHF and DPO post-training corpora.
Framework and runtime
Inference framework (vLLM, Triton, TorchServe, llama.cpp) and version, CUDA and cuDNN versions where relevant, container image digest, server configuration.
Retrieval and embedding stack
Embedding model identity, vector store and version, index strategy, corpus snapshot identity, retrieval policy configuration. Captures the RAG-side surface.
Agent and tool catalogue
For agentic systems, the orchestrator framework, the tool definitions and versions, the function signatures exposed to the model, the human-in-the-loop policy.
Guardrails and evaluation
Guardrail layer identity and configuration, content-filter versions, evaluation results, OWASP LLM Top 10 test record references, red-team report pointers.
Without model identity, you cannot prove which checkpoint was evaluated. Without training and fine-tuning data, you cannot answer a takedown notice or a data-subject request that asks whether personal data appears in the corpus. Without framework and runtime, you cannot trace a runtime vulnerability to the affected build. Without the retrieval and embedding stack, you cannot reason about the OWASP LLM08 vector and embedding weakness surface. Without the agent and tool catalogue, you cannot reason about the OWASP LLM06 excessive agency surface. Without guardrails and evaluation, you cannot connect the AIBOM to any defensible claim about model behaviour. The six layers are the floor.
How the AIBOM Reads Against the Framework Map
The AIBOM is increasingly cited across the regulatory and assurance map. The exact phrasing varies (the EU AI Act talks about technical documentation, NIST AI RMF talks about AI inventory and lifecycle documentation, ISO/IEC 42001 talks about AI system documentation, OWASP LLM Top 10 talks about model and supply chain transparency), but the underlying expectation is the same: a buyer, an auditor, or a regulator expects to see a structured record of what is in the AI system, where it came from, and how it behaves. An AIBOM written to CycloneDX ML-BOM or SPDX 3.0 AI Profile meets that expectation across the map.
EU AI Act
Annex IV technical documentation for high-risk systems explicitly expects description of training data, model architecture, intended purpose, and validation results. The AIBOM plus model card plus dataset card plus evaluation record is the natural shape of that pack. EU CRA requirements apply to embedded AI products in parallel.
NIST AI RMF
The Map and Measure functions of NIST AI RMF expect AI system inventory and documentation. NIST AI 600-1 (the Generative AI profile) extends this to model and supply-chain transparency. The AIBOM is the inventory artefact those functions expect to read.
ISO/IEC 42001
The AI management system standard expects documented information on AI systems, their components, and their lifecycle. The AIBOM is the durable form of that evidence and slots into the management-review pack.
OWASP LLM Top 10
LLM03 supply chain and LLM05 improper output handling both lean on AIBOM-style inventory to be auditable. The OWASP LLM Top 10 guide covers the testing surface that sits beside the inventory.
The AI security posture management discussion sits one layer up from the AIBOM. Where the AIBOM is a static, build-time inventory artefact, AI posture management is the runtime read of how the inventory behaves: which models are active, which datasets are still in scope, which retrieval indexes have drifted. Our AI-SPM guide covers the operating layer that consumes AIBOM data and produces the posture read.
Generating an AIBOM: Build-Time, Registry-Time, and Runtime
There are three broad ways to produce an AIBOM. Build-time generation is the strongest and the rarest. Registry-time generation, where the AIBOM is produced at the model registry boundary, is the most common and the most pragmatic. Runtime generation, where the AIBOM is reconstructed from the running system, is necessary for shadow-AI discovery and for legacy AI features that never had a documented build.
Build-time generation
- Run inside the training, fine-tuning, or distillation pipeline.
- Capture base model identity, training data manifest, transformations applied.
- Pull library components from the training environment lockfile.
- Sign the AIBOM with the build pipeline identity for provenance.
- Best for first-party models that are built inside the organisation.
Registry-time generation
- Run when a model is registered into the model registry or feature store.
- Capture the registered checkpoint hash, the parent base model, fine-tune lineage.
- Pull metadata the registry already stores about the model card and dataset card.
- Best for production models that flow through a controlled registry.
- The most common pattern in mature AI platform teams.
Runtime generation
- Inspect a running inference service or container.
- Identify the model from the loaded checkpoint and serving framework metadata.
- Reconstruct the runtime stack from container layers and process inventory.
- Necessary for shadow-AI discovery and legacy AI features.
- Lossy where the model file has been stripped, repacked, or quantised.
Vendor-supplied AIBOM
- Request the AIBOM from the model vendor for third-party hosted models.
- Cross-reference vendor model card with the running model identity.
- Match procurement-grade AIBOM expectations under the EU AI Act for high-risk use.
- Default expectation for foundation models accessed via API.
The realistic default for an enterprise programme is a combination. Production models generate registry-time AIBOMs. Foundation models accessed through APIs use the vendor-supplied AIBOM (or the most equivalent vendor disclosure where a formal AIBOM is not yet published). Shadow-AI features discovered after the fact use runtime reconstruction. First-party fine-tunes that flow through a controlled training pipeline generate build-time AIBOMs that capture the strongest provenance. The four sources converge on the same engagement record at ingestion time.
Ingesting AIBOMs Into the AppSec and VM Programme
Generating an AIBOM is the easier half. Ingesting one (your customer AIBOMs, your vendor AIBOMs, your internal ML platform AIBOMs, your shadow-AI discovery output) and acting on the data is where most programmes stall. The ingestion problem has the same three layers as the SBOM ingestion problem (parsing, scoping, lifecycle) with three extra concerns that are unique to AI.
Parsing
Read the CycloneDX ML-BOM or SPDX 3.0 AI Profile. Validate against the format schema. Reject AIBOMs that fail validation rather than ingesting partial inventories. Where the AIBOM references a model card or dataset card by URI, fetch and pin the version referenced at ingestion time. Treat the AIBOM as immutable per build.
Scoping
Bind the AIBOM to the asset it describes. The asset may be an AI feature within an application, an inference endpoint, a model registry entry, or an embedded AI module inside a product. Without the asset binding, the AIBOM is a document with nowhere to live and the audit query has no anchor.
Lifecycle
Track when the AIBOM is superseded by a newer build, when the underlying model is retired, when a referenced dataset is taken down, and when a model card pointed at by URI changes. The AIBOM is point-in-time evidence; the lifecycle layer turns the sequence of point-in-time documents into a defensible audit trail.
AI-specific: dataset takedown and licence change
Training datasets are mutable in ways libraries are not. A dataset may be taken down, relicensed, or have a subset retracted under copyright or data-subject pressure. Ingestion must capture the dataset version pinned at training time and flag when a referenced dataset state has changed upstream.
AI-specific: model deprecation and weight changes
A foundation model accessed by API can be silently upgraded by the vendor. The AIBOM must capture the API model identifier and version, and the ingestion side must alert when the upstream model is deprecated, replaced, or has a weight change that the vendor does not version. Sticky model selection is a control, not a default.
AI-specific: evaluation drift
Evaluation results referenced by the AIBOM age fast. A model that passed an OWASP LLM Top 10 test six months ago may fail the same test today because the test corpus, the model, or the surrounding runtime has changed. The ingestion side must record the evaluation date and trigger re-evaluation when the AIBOM is superseded.
AIBOM and the Vulnerability Management Programme
The AIBOM connects to vulnerability management the same way the SBOM does, with two differences. The first difference is the source of the advisory data. Classical vulnerability sources (NVD, GHSA, OSV, vendor advisories) cover the libraries inside the AI runtime stack, but the model-side advisory landscape is younger and more fragmented. Hugging Face publishes model security advisories. Vendor model security pages cover their hosted foundation models. The OSV-style coverage for ML packages is improving but not yet uniform. Programmes treat the model-side advisory stream as a separate ingestion path that lands in the same finding queue.
The second difference is the nature of the finding. A classical CVE is binary: the dependency is on the affected version or it is not. A model-side finding is often behavioural: the model exhibits a known jailbreak pattern, the model leaks PII at a measurable rate, the model invokes the wrong tool under adversarial nudge. These findings are produced by red-team testing and behavioural evaluation, and they attach to the AIBOM-asset binding the same way a manual pentest finding attaches to an engagement.
A defensible AIBOM-aware vulnerability management read combines four streams: the classical SCA stream against the AI runtime libraries, the model-side advisory stream against the model identity, the red-team and behavioural evaluation stream against the model behaviour, and the dataset takedown and licence stream against the training data references. All four streams land as findings on the same asset record, ranked through the same prioritisation framework (CVSS for severity, EPSS where the finding maps to a CVE, KEV where the underlying library is in the known-exploited catalog), and worked through the same SLA discipline.
The AIBOM is what makes the four streams converge. Without it, the SCA findings live in one tool, the model advisories live in a model registry chat thread, the red-team findings live in a report PDF, and the dataset takedowns live in legal's inbox. With it, all four reference the same asset binding and the audit query reads from one record.
Common Failure Modes When Standing Up an AIBOM Programme
Six failure patterns recur across programmes that try to stand up AIBOM coverage in the first six months. Recognising them in advance saves the time spent rebuilding the pipeline after they surface in an audit conversation.
Treating the AIBOM as a one-time artefact
An AIBOM generated once and stored in a wiki ages out within a release cycle. The AIBOM is per-build evidence and the lifecycle layer is the part that earns audit trust. Treat the AIBOM as regenerated on every model release the same way the SBOM is regenerated on every software build.
Stopping at the model and skipping the data
Capturing the model checkpoint and the runtime stack without the training and fine-tuning dataset references is the most common shortcut and the one that hurts most under EU AI Act technical documentation, under copyright takedown notices, and under data-subject requests. The data side of the AIBOM is the difficult half and is also the half that produces the most regulatory value.
Embedding the model card narrative inside the AIBOM
Inlining the human-readable model card inside the AIBOM duplicates evidence and guarantees the two will drift. Reference the model card by stable URI and pin the version at AIBOM generation time. The narrative belongs in the model card; the AIBOM holds the pointer.
Ignoring API-accessed foundation models
A system that calls a hosted foundation model still has an AI dependency. The AIBOM must record the vendor, the API model identifier, the version (where the vendor exposes one), and the prompt and configuration layer. Treating API-accessed models as out of scope leaves a regulatory gap exactly where the supplier-risk conversation lands.
Producing AIBOMs no one ingests
Generation without ingestion is shelf decoration. The downstream ingestion path (vulnerability matching, asset binding, lifecycle tracking, audit pack assembly) has to exist before the generation effort earns programme value. Start with the ingestion target and work backwards into generation, not the other way around.
Building AIBOM evidence outside the wider VM record
AIBOM lifecycle running on a separate platform from the classical SBOM and the vulnerability management findings forces a multi-tool reconciliation at audit time. The AIBOM is most useful when it lands on the same engagement record as the SBOM, the scanner findings, the red-team output, and the framework mapping.
A Four-Week AIBOM Rollout for an Internal Programme
AIBOM coverage is achievable in four weeks for a programme that already has SBOM generation in place. The four-week shape below is not a productised plan; it is a recurring sequence that programmes converge on when they roll AIBOM into the existing AppSec, ML platform, and vulnerability management work.
Week 1: Scope and inventory
List every AI feature in the production estate. Capture first-party models, third-party hosted models, embedded foundation-model API calls, RAG-backed features, and agentic features. For each, identify the build path (build-time, registry-time, runtime reconstruction, vendor-supplied). The output is a candidate AIBOM target list with an assigned generation strategy per target.
Week 2: Generation
Stand up the generators for each strategy. Build-time generators sit inside the training and fine-tuning pipeline. Registry-time generators run at model registration. Runtime reconstruction generators run against the production inference services. For vendor-supplied paths, formalise the procurement-side AIBOM ask. Produce a first AIBOM per target.
Week 3: Ingestion and asset binding
Build the ingestion path. Parse and validate the AIBOM against the format schema. Bind each AIBOM to its asset record. Match library components against existing vulnerability sources. Set up the model-side advisory stream, even if the only source initially is vendor advisories and Hugging Face. Wire the dataset takedown stream into the same finding queue.
Week 4: Lifecycle, evidence, and reporting
Wire the AIBOM lifecycle: regeneration on every model release, supersede on upstream model deprecation, alert on dataset state change. Stand up the audit-read pack: AIBOM plus model card plus dataset card plus evaluation record per asset. Map the pack to the EU AI Act Annex IV, NIST AI RMF Map and Measure functions, ISO/IEC 42001 documented information clauses, and OWASP LLM Top 10 LLM03 evidence.
Programmes that adopt this shape often arrive at week five with a single AIBOM inventory record that AppSec, the ML platform team, vulnerability management, GRC, and CISO leadership all read from the same source. The audit conversation collapses from a four-team scramble into a single record query.
Where SecPortal Fits
SecPortal does not generate AIBOMs and does not parse ML model files. The AIBOM generation work happens in the training pipeline, the model registry, the inference runtime, or the vendor supply chain. What SecPortal provides is the same engagement record where the AIBOM-derived findings, the surrounding SAST and SCA findings from connected repositories against the AI runtime libraries, the findings management workflow for triage and lifecycle, the document management store for the AIBOM file itself, the model card, and the dataset card, finding comments and collaboration for the cross-team conversation, the activity log for the timestamped state changes across findings, engagements, and documents, the compliance tracking mapping to ISO 27001, SOC 2, Cyber Essentials, PCI DSS, and NIST, and AI-powered report generation when leadership wants the executive summary.
None of these features produce the AIBOM. What the platform provides is one record where the AIBOM document, the AIBOM-derived findings, the model card and dataset card references, the lifecycle, the framework mapping, and the leadership read all live so the audit conversation collapses into a query rather than a multi-team evidence scramble.
Wider Reading
The AIBOM topic intersects with several other parts of the AI security, vulnerability management, and AppSec programme. The following pages cover the adjacent disciplines from different angles and feed back into the AIBOM workflow.
- SBOM guide for the classical software-side inventory that the AIBOM extends. AIBOM is the strict superset of an SBOM when the system is an AI feature; the SBOM patterns and tools are the right starting point.
- VEX guide for the assertion document that pairs with the AIBOM to mark advertised vulnerabilities that are not exploitable in the deployed model and runtime.
- OWASP Top 10 for LLM Applications for the risk catalogue that sits beside the AIBOM and that the model card evaluation record references.
- AI security posture management (AI-SPM) for the runtime read of the AIBOM inventory: what is active, what has drifted, what has been replaced.
- MLSecOps implementation guide for the operating model the AIBOM lives inside, covering the six capability layers, the lifecycle gates, the responsibility split across data engineering, ML platform, AppSec, GRC and security leadership, and the framework crosswalk against the EU AI Act, NIST AI RMF, and ISO/IEC 42001.
- Software supply chain security guide for the umbrella operating model the AIBOM, SBOM, VEX, and SLSA workstreams sit inside, covering threat model, build integrity, regulatory frame, and audit-grade evidence.
- Secure code review for AI-generated code for the developer-side review discipline that surrounds AI-feature code in the same repositories the AIBOM describes.
- CISA Secure Software Development Attestation for the federal procurement-side push that is extending into AI components and that the AIBOM-plus-attestation pair is the natural answer to.
- System prompt leakage, indirect prompt injection via RAG, excessive agency, improper output handling, unbounded consumption, and prompt injection for the per-entry LLM vulnerability pages that produce findings against the AIBOM-bound assets.
- SBOM management and VEX publishing for the operating record that ties inventory generation, ingestion, asset binding, vulnerability matching, and customer delivery to one engagement. The same record shape carries AIBOM workflows.
- Vulnerability prioritisation and vulnerability SLA management for the workflow that ranks AIBOM-derived findings against scanner-led findings and turns the ranked queue into deadlines.
- NIST AI RMF, EU Cyber Resilience Act, CISA Secure by Design, NIST SSDF, and ISO 27001 for the framework-side mapping that AIBOM-derived evidence flows into. The AI Act Annex IV technical documentation reads directly against the AIBOM plus model card plus dataset card pack this guide describes.
- AppSec teams, product security teams, GRC and compliance teams, and CISOs for the buyer pages that read the AIBOM evidence from each perspective.
Run AIBOM-Aligned AI Security on a Single Record
AIBOM is mostly a recordkeeping problem in disguise. The formats are public, the generation patterns are converging, and the framework integration is documented. What stops most programmes is that the AIBOM file lives in the ML registry, the model card lives in a separate wiki, the SCA findings against the AI runtime live in the SAST tool, the red-team output sits in a report PDF, the dataset takedown notice arrives by email, and the framework mapping is in a spreadsheet. Producing the audit pack means reconciling five sources at audit time, and producing the leadership read means reconciling them again.
SecPortal is built around a single engagement record where AIBOM-derived findings, attached AIBOM documents, model card and dataset card references, finding lifecycle, framework mapping, leadership read, and activity audit trail all sit on the same workspace. The platform does not parse the AIBOM file for you. What it does is keep the rest of the programme on one record so the AIBOM you ingest somewhere else turns into AI security evidence on the engagement record without the multi-tool reconciliation that usually breaks the audit conversation.
Run AIBOM-aligned AI security on SecPortal
Stand up the engagement record in under two minutes. Free plan available, no credit card required.