Have a regulatory question?
Talk to a Korea regulatory specialist about your device, your timeline, or your next submission.
Talk to a specialist
A working SBOM template in SPDX and CycloneDX formats with FDA-aligned metadata fields, vulnerability mapping, and example entries for medical device software.
Email verification · 10-min code
No previous versions available.
A working SBOM (Software Bill of Materials) template pack for medical device cybersecurity submissions:
The template pack is aligned with the FDA's 2023 Cybersecurity in Medical Devices final guidance and is compatible with the MFDS 2026 cybersecurity submission requirements.
The FDA's 2023 final guidance made SBOM a required deliverable for premarket cybersecurity submissions. The submission expectation is not just "provide an SBOM" — it is "provide an SBOM that the reviewer can use to assess third-party component risk." The two are different.
A weak SBOM that lists components but omits versions, lacks license information, and provides no link to known vulnerabilities will be returned with deficiency findings. A strong SBOM enables the reviewer to quickly identify whether the device incorporates components with known critical vulnerabilities and how the manufacturer is managing them.
Roughly 30% of premarket cybersecurity deficiency letters we have seen relate to SBOM completeness or structure. The fix is a structured template that captures the required fields from the start of development.
The FDA expects the SBOM to contain, at minimum:
Additional fields strongly recommended:
Both formats are accepted by FDA. The choice is largely about tooling.
SPDX — broader adoption in enterprise software supply chain (Linux Foundation steward). Better for organizations already using enterprise dependency-management tools (Black Duck, Snyk, Synopsys).
CycloneDX — broader adoption in security communities (OWASP steward). Better for organizations using security-focused tooling (OWASP Dependency-Track, OWASP DefectDojo).
For medical device manufacturers without existing SBOM tooling, CycloneDX is generally easier to start with — the JSON schema is simpler, the generator tooling (Syft, CycloneDX-CLI) is mature and free, and the integration with vulnerability databases is more direct.
For larger manufacturers with existing enterprise security tooling, SPDX is generally already in use — building on the existing tooling is the right call.
The template pack includes a complete SBOM for a hypothetical Class II SaMD device — a cloud-connected diagnostic imaging viewer. The example demonstrates:
The example file is approximately 800 lines in JSON format. It is intended as a reference for "what good looks like" — most actual devices will have 30–200 components depending on architecture.
Beyond the SBOM itself, the FDA expects evidence of how the manufacturer monitors and responds to known vulnerabilities affecting SBOM components.
The included worksheet captures, for each vulnerable component:
This worksheet integrates with the Vulnerability Management Plan required by FDA cybersecurity submissions. The SBOM is the input; the worksheet is the operational output.
A common failure mode: manufacturers produce a clean SBOM for the premarket submission, then do not maintain it post-clearance. Six months later the SBOM is stale, new CVEs have emerged, and the post-market vulnerability management evidence shows gaps.
The lifecycle update workflow in the template covers:
Manufacturers running this workflow report meaningfully faster response to emerging vulnerabilities — typically days rather than weeks from CVE disclosure to mitigation plan.
The 2026 MFDS cybersecurity guidance (effective July 1, 2026) accepts SBOMs in SPDX or CycloneDX format with substantially the same field requirements as FDA. An SBOM built for FDA submission can be reused for MFDS with translation of any narrative fields (component descriptions, risk assessments) into Korean.
This is one of the highest-leverage reusability points in cybersecurity submissions across the two jurisdictions. Manufacturers that build SBOM workflow well report 90%+ content reuse between FDA and MFDS cybersecurity packages.
Mistake 1: Listing only direct dependencies. Transitive dependencies often contain the vulnerable components. The SBOM must include the full dependency tree.
Mistake 2: Vague versioning. "OpenSSL 3.x" is not acceptable. "OpenSSL 3.0.7" with the exact patch level is required.
Mistake 3: Missing license information. Even open-source components have licenses. The license field cannot be left blank.
Mistake 4: Treating internal company libraries differently. First-party internal libraries are still components and belong in the SBOM. Their license is whatever the company internally uses (often proprietary).
Mistake 5: Static SBOM in a moving codebase. SBOMs generated manually at submission time become stale by the time of clearance. Automated generation tied to the build process is essential.
Download the SBOM Template Pack — includes SPDX and CycloneDX templates, the worked example, vulnerability mapping worksheet, and lifecycle workflow guide.
The Cybersecurity service runs full premarket cybersecurity submission preparation including SBOM, threat modeling, and vulnerability management plan. For SaMD-specific cybersecurity work in the Korean context, Korea SaMD Approval integrates cybersecurity with the broader submission.
Talk to a Korea regulatory specialist about your device, your timeline, or your next submission.
Talk to a specialist
A structured PMS Plan template aligned with ISO 13485, EU MDR Article 84, FDA 21 CFR 820.100, and MFDS Article 31 — with data source matrices and analysis cadence templates.

A ready-to-use pack of regulatory-aligned marketing asset templates — brochures, detail aids, web pages, and pitch decks — pre-structured for FDA, EU, and Korean MFDS review.
![[TEST] OTP Download Verification – Template](/images/templates/medtech-launch-playbook.jpg)
Test post used to validate the OTP email + verified-download flow on the template detail page.