SCA — Glossary

Software Composition Analysis

A security practice and toolset that identifies open-source and third-party components in a codebase, detects known vulnerabilities in those dependencies, and monitors license compliance.

Last updated

What Is SCA?

Software Composition Analysis (SCA) addresses a fundamental reality of modern software: most applications are composed primarily of open-source libraries and third-party components. Studies consistently show that 70-90% of a typical application's code comes from open-source dependencies.

SCA tools scan your dependency manifests (package.json, requirements.txt, go.mod, pom.xml) and lockfiles to build a complete inventory of every direct and transitive dependency, then check each against vulnerability databases.

Why SCA Matters

  • Log4Shell (CVE-2021-44228) demonstrated how a single vulnerability in a ubiquitous library could affect millions of applications worldwide
  • Many organizations don't know which open-source components they use, let alone whether those components have known vulnerabilities
  • License compliance is a legal risk — some open-source licenses have requirements that conflict with commercial software distribution

Key SCA Capabilities

| Capability | Description | |---|---| | Dependency inventory | Complete list of direct and transitive dependencies | | Vulnerability detection | Match dependencies against CVE databases (NVD, OSV, vendor advisories) | | Reachability analysis | Determine if vulnerable code paths are actually called by your application | | License detection | Identify licenses of all dependencies and flag policy violations | | Fix guidance | Recommend minimum upgrade versions that resolve vulnerabilities | | SBOM generation | Produce Software Bill of Materials in SPDX or CycloneDX format | | CI/CD gating | Block builds or merges when critical vulnerabilities are found |

SCA vs. SAST

SCA and SAST are complementary:

  • SCA finds known vulnerabilities in third-party code you didn't write
  • SAST finds bugs in first-party code you did write

Both should be part of your application security program.

Leading SCA Vendors

Major SCA tools include Snyk, Mend.io, Black Duck (Synopsys), GitHub Dependabot, Sonatype Nexus, and Trivy (open source).

Sources & References

  1. NIST Cybersecurity Framework (CSF) 2.0[Government Standard]
  2. NIST Computer Security Resource Center[Government Standard]
  3. MITRE ATT&CK Framework[Industry Framework]
  4. OWASP Foundation[Industry Framework]
  5. CISA Cybersecurity Best Practices[Government Standard]
  6. SANS Institute Reading Room[Industry Research]
  7. Cloud Security Alliance (CSA)[Industry Framework]
  8. CIS Critical Security Controls[Industry Framework]
  9. Gartner Magic Quadrant for Application Security Testing 2024[Analyst Report]
  10. Forrester Wave: Static Application Security Testing, Q3 2024[Analyst Report]
  11. Forrester Wave: Software Composition Analysis, Q2 2024[Analyst Report]
  12. IDC MarketScape: Worldwide Application Security Testing 2024[Analyst Report]
  13. OWASP Top 10 Web Application Security Risks[Industry Framework]
  14. OWASP Application Security Verification Standard (ASVS)[Industry Framework]
  15. NIST Secure Software Development Framework (SSDF)[Government Standard]
  16. Gartner Peer Insights: Application Security Testing[Peer Reviews]