Skip to main content

Dependency Management and SBOM

Overview

The Dependencies page provides a complete Software Bill of Materials (SBOM) for your connected repositories. View all direct and transitive dependencies, identify vulnerable packages, and track remediation.

SBOM (Software Bill of Materials)

What is SBOM?

An SBOM is an inventory of all software components:

  • Direct dependencies
  • Transitive dependencies
  • Versions
  • Licenses
  • Vulnerabilities

Generating SBOMs

  1. Connect Repository

    Link your code repositories via VCS integration.

  2. Scan

    Bastion analyzes package manifests.

  3. Generate

    SBOM generated in standard format.

  4. Monitor

    Continuous monitoring for changes.

SBOM Formats

FormatDescription
SPDXLinux Foundation standard
CycloneDXOWASP standard
JSONCustom JSON format

Dependency Scanning

What We Scan

EcosystemManifest Files
JavaScript/Nodepackage.json, package-lock.json, yarn.lock
Pythonrequirements.txt, Pipfile, pyproject.toml
Javapom.xml, build.gradle
Gogo.mod, go.sum
RubyGemfile, Gemfile.lock
PHPcomposer.json, composer.lock
RustCargo.toml, Cargo.lock
C#/.NET*.csproj, packages.config

Scan Process

  1. Parse manifest files
  2. Resolve all dependencies (including transitive)
  3. Check against vulnerability databases
  4. Calculate risk scores
  5. Generate reports

Vulnerability Sources

SourceCoverage
NVDNational Vulnerability Database
GitHub AdvisoryGitHub Security Advisories
OSVOpen Source Vulnerability Database
Vendor AdvisoriesDirect from maintainers

Viewing Results

Dependencies Table

View all dependencies with a toggle to show only those with vulnerabilities:

ColumnDescription
NamePackage name
VersionInstalled version
LatestLatest available
LicensePackage license
VulnerabilitiesCVE count
Direct/TransitiveDependency type

Vulnerability Details

Click on a vulnerability:

  • CVE ID and description
  • Severity (CVSS score)
  • Affected versions
  • Fixed version
  • Remediation guidance

Remediation

Upgrade Dependencies

To fix vulnerabilities:

  1. Review vulnerability details
  2. Check fixed version compatibility
  3. Update package manifest
  4. Test changes
  5. Deploy update
  6. Verify fix

Remediation Workflow

ActionWhen to Use
UpgradeFixed version available
ReplaceAlternative package exists
PatchApply security patch
AcceptRisk accepted (documented)

Pull Request Integration

Bastion can create PRs:

  1. Enable auto-PR in settings
  2. Configure target branches
  3. Bastion creates PRs for fixes
  4. Review and merge

License Compliance

License Detection

Detect licenses in dependencies:

  • MIT, Apache, GPL, BSD, etc.
  • License compatibility checking
  • Policy enforcement

License Policies

Define acceptable licenses:

  1. Go to SettingsLicense Policy
  2. Add allowed licenses
  3. Add restricted licenses
  4. Enable enforcement

License Violations

When restricted license detected:

  • Alert generated
  • Issue created
  • Blocking (optional)

Monitoring

Continuous Scanning

Scans run:

  • On each commit (if webhooks enabled)
  • Daily scheduled scan
  • Manual trigger via the Rescan button

Alerts

Configure alerts for:

Alert TypeTrigger
New CriticalCritical CVE discovered
New HighHigh-severity CVE
New DependencyDependency added
License ViolationRestricted license

Reporting

Security Reports

Generate reports:

  • Vulnerability summary
  • Dependency inventory
  • License compliance
  • Trend analysis

Compliance Evidence

SBOM documentation supports:

FrameworkRequirement
SOC 2CC7.1
ISO 27001A.14.1.2
HIPAA§164.312(e)

Best Practices

Keep Dependencies Updated

Regular updates prevent vulnerability accumulation. Automate where possible.

Minimize Dependencies

Fewer dependencies = smaller attack surface. Regularly audit necessity.

Lock Versions

Use lock files to ensure reproducible builds and prevent supply chain attacks.

Monitor All Repositories

Include all repositories, even internal tools and scripts.

Next Steps