In recent years, “supply chain security risks“, in which products, systems, and services are subject to security breaches through the supply chain related to their procurement, maintenance, and operation, have become more apparent, and interest in and needs to address such risks are increasing. In response, countries around the world are increasingly discussing the creation and provision of “visualization data” on software configurations based on the SBOM format, a standard data format for listing software components.

Since the creation and provision of this visualization data entails a cost burden for suppliers of products, etc., it is essential to effectively utilize the visualization data at a level commensurate with such costs. In addition, effective utilization encourages the creation and provision of visualization data, leading to a virtuous cycle that leads to a further expansion of utilization scenarios.

Therefore, in this consortium, various businesses that form the supply chain (product vendors, system integrators, security vendors, and businesses that use and operate products, systems, and services, etc.) will cooperate to engage in “co-creation of knowledge” that will contribute to the promotion of the use of visualization data. We aim to promote the creation and provision of visualization data, and to further expand the use of visualization data by sharing the knowledge and know-how possessed by each business entity.

Increasing the transparency of equipment and systems developed through the
supply chain and building a safe and secure system

Security Transparency Consortium


Message from the President

Atsuhiro Goto

President, Security Transparency Consortium

Institute of information security President

Products and services provided by companies and organizations around the world are supported by diverse supply chains, from the planning and design stages to the construction and operation stages. There is a risk that not only the company or organization itself may be directly compromised, but also the security of its business environment and products of the players in the supply chain may be compromised, which is called “supply chain security risk”. Governments, companies, and organizations are highly concerned about supply chain security risk, and many initiatives are underway to address this issue.

One effective means of addressing supply chain security risks is to ensure security transparency by using data that visualizes the contents of products and systems (e.g., software configuration). On the other hand, the creation and provision of visualized data entails a cost burden for suppliers of products, etc. Therefore, effective use of visualized data at a level commensurate with such costs is essential.

The Security Transparency Consortium aims at “co-creation of knowledge” that contributes to the promotion of the use of visualized data through the cooperation of various businesses that form the supply chain. The Consortium will also promote community activities and collaboration with government agencies and other organizations that contribute to these efforts.

What’s new

  • Visualized Data Utilization Working Group 14th meeting
    The 14th meeting of the Visualization Data Utilization Working Group was held on July 24th.The next deliverables will likely be announced around the first anniversary of the consortium’s launch. As the creation nears its final stages, the discussions are heating up.
  • Visualized Data Utilization Working Group 13th meeting
    The 13th meeting of the Visualization Data Utilization Working Group was held on July 4th.Sumitomo Mitsui Trust Holdings, Inc. new member, attended WG and talked about their future plans.The next deliverable is in the final stages and the discussions are heated.
  • New Participants
    On June 28th, Sumitomo Mitsui Trust Holdings, Inc. application to join the Consortium was approved and the company has decided to participate in the Consortium. We look forward to working with you in the future!We will continue to recruit members who agree with the consortium’s philosophy and would like to join.
  • Visualized Data Utilization Working Group 12th meeting
    The 12th meeting of the Visualization Data Utilization Working Group was held on June 13th.Contract Security, Inc. and Cybertrust Japan Co., Ltd. both new members, attended WG and talked about their future plans.The next deliverable is in the final stages and the discussions are heated.
  • New Participants
    On June 10th, Contrast Security, Inc. and Cybertrust Japan Co., Ltd. application to join the Consortium was approved and the company has decided to participate in the Consortium. We look forward to working with you in the future!The number of members has more than doubled to 17 companies since the consortium was launched in September… Read more: New Participants