In recent years, “supply chain security risks“, in which products, systems, and services are subject to security breaches through the supply chain related to their procurement, maintenance, and operation, have become more apparent, and interest in and needs to address such risks are increasing. In response, countries around the world are increasingly discussing the creation and provision of “visualization data” on software configurations based on the SBOM format, a standard data format for listing software components.

Since the creation and provision of this visualization data entails a cost burden for suppliers of products, etc., it is essential to effectively utilize the visualization data at a level commensurate with such costs. In addition, effective utilization encourages the creation and provision of visualization data, leading to a virtuous cycle that leads to a further expansion of utilization scenarios.

Therefore, in this consortium, various businesses that form the supply chain (product vendors, system integrators, security vendors, and businesses that use and operate products, systems, and services, etc.) will cooperate to engage in “co-creation of knowledge” that will contribute to the promotion of the use of visualization data. We aim to promote the creation and provision of visualization data, and to further expand the use of visualization data by sharing the knowledge and know-how possessed by each business entity.

Increasing the transparency of equipment and systems developed through the
supply chain and building a safe and secure system

Security Transparency Consortium


Message from the President

Atsuhiro Goto

President, Security Transparency Consortium

Institute of information security President

Products and services provided by companies and organizations around the world are supported by diverse supply chains, from the planning and design stages to the construction and operation stages. There is a risk that not only the company or organization itself may be directly compromised, but also the security of its business environment and products of the players in the supply chain may be compromised, which is called “supply chain security risk”. Governments, companies, and organizations are highly concerned about supply chain security risk, and many initiatives are underway to address this issue.

One effective means of addressing supply chain security risks is to ensure security transparency by using data that visualizes the contents of products and systems (e.g., software configuration). On the other hand, the creation and provision of visualized data entails a cost burden for suppliers of products, etc. Therefore, effective use of visualized data at a level commensurate with such costs is essential.

The Security Transparency Consortium aims at “co-creation of knowledge” that contributes to the promotion of the use of visualized data through the cooperation of various businesses that form the supply chain. The Consortium will also promote community activities and collaboration with government agencies and other organizations that contribute to these efforts.

What’s new

  • Visualized Data Utilization Working Group 10th meeting
    The 10th meeting of the Visualization Data Utilization Working Group was held on May 16th.The activity vision was announced on February 16th, and we continue to move towards the next deliverable.There was a heated discussion about who should be the intended readers of the collection of knowledge, how to organize it, etc.
  • New Participants
    On May 15th, ZYYX Inc. application to join the Consortium was approved and the company has decided to participate in the Consortium. We look forward to working with you in the future!
  • Visualized Data Utilization Working Group 9th meeting
    The 9th meeting of the Visualization Data Utilization Working Group was held on April 25th.The activity vision was announced on February 16th, and we continue to move towards the next deliverable.There was a heated discussion about who should be the intended readers of the collection of knowledge, how to organize it, etc.
  • Visualized Data Utilization Working Group 8th meeting
    The 8th meeting of the Visualization Data Utilization Working Group was held on April 12th.The members of the four new companies actively participated in the discussion.The activity vision was announced on February 16th, and we continue to move towards the next deliverable.We aim to create a work that even people who don’t know about SBOM… Read more: Visualized Data Utilization Working Group 8th meeting
  • New Participants
    On April 5th, Assured, Inc. application to join the Consortium was approved and the company has decided to participate in the Consortium. We look forward to working with you in the future!