Hexamind

Docs

Search docs...

⌘K
ENRequest Access
Documentation
  • Getting Started

  • TrustBOM

    • Concepts

    • Sign & Share

    • TrustObjects

    • Certificates

    • External Verify

  • Hexamind AI

    • Concepts

    • AI Advisor

    • Analysis Panel

    • Reports

  • Security Advisory

    • Terms & Concepts

    • Projects

    • Vulnerability Audit

    • Environments

  • Compliance

    • Security Baseline

    • License Management

    • Vulnerability DB

  • Security & Policy

    • Security Architecture

    • AI Analysis & Data Security

    • VDP

  • Regulations

  • FAQ

Back to Home

Contact

Regulations

Regulatory Readiness Matrix

See major software supply chain security regulations and how Hexamind Platform can support the operational evidence and response workflows they require.

Legal Notice

This page is provided for general reference only and does not constitute legal advice. Actual regulatory scope and submission requirements may vary by timing, authority, and contract terms, so official guidance and legal review should always be checked together.

Regulatory Overview

Since U.S. Executive Order 14028 in 2021, software supply chain security expectations have become more concrete across the U.S. and EU. In Korea, the publication of guidance and the expansion of support programs are also making the readiness path clearer. Actual timing and obligation levels still vary by framework.

2021

U.S. E.O. 14028 Federal software supply chain security push

2024

EU CRA enters force Digital product security obligations

2024

Korean guidance 1.0 released Supply chain security baseline published

2025

Support programs expanded SBOM-based diagnostics and pilots

🇺🇸 U.S. Executive Order 14028

Issued in 2021 · followed by procurement guidance
U.S. federal software supply chain security framework
Status: Guidance in Effect

In U.S. federal procurement, expectations around SBOMs, secure development practices, and vulnerability management have become increasingly concrete. The exact scope still depends on procurement context and follow-on guidance.

Key Requirements

• Potential requests for machine-readable SBOMs depending on procurement terms

• Documented vulnerability disclosure and response practices

• Visibility into components and licenses

• Prepared response processes for known vulnerabilities

How Hexamind Helps

Always validate actual submission format and scope against authority guidance and contract conditions.

SBOM readiness

→ Use TrustBOM and project analysis workflows to organize materials in standard formats

Vulnerability evidence and reporting

→ Document project-level findings through Security Advisory and reporting workflows


🇪🇺 EU Cyber Resilience Act

Entered into force in 2024 · some duties from 2026 · main obligations from 2027
Security obligations for digital products in the EU
Status: Transition Period

Organizations placing products with digital elements on the EU market need security-by-design, vulnerability handling, update, and support processes across the product lifecycle. The exact scope and product classification should be checked against official guidance.

Key Requirements

• Pre-release security review and vulnerability handling

• Serious vulnerability reporting procedures

• Technical documentation and component information management

• Security update and support period information

How Hexamind Helps

Always validate actual submission format and scope against authority guidance and contract conditions.

Vulnerability analysis

→ Maintain project-level review history through Security Advisory and Audit

Patch and prioritization decisions

→ Use Hexamind AI to organize recommended actions and patch direction


🇰🇷 Korean Supply Chain Security Guidance and Procurement Trend

Guidance released in 2024 · support expanded in 2025
Published guidance and expanding support programs
Status: Guidance Published

In Korea, software supply chain security guidance has been published, and SBOM-based diagnostics and model-building support expanded in 2025. Actual evidence requirements and application methods may still vary by authority and program.

Key Requirements

• Potential requests for SBOMs or component inventories depending on the program

• Alignment with secure development and supply chain security expectations

• Prepared vulnerability findings and security evidence

• Organized open source license posture

How Hexamind Helps

Always validate actual submission format and scope against authority guidance and contract conditions.

SBOM and evidence organization

→ Use Security Advisory and TrustBOM to structure analysis outputs and delivery materials

License and compliance evidence

→ Organize license and baseline evidence in the Compliance module

Coverage Matrix

This reference matrix shows, at a high level, how key Hexamind capabilities can support common regulatory readiness activities.

Hexamind Capability

E.O. 14028

EU CRA

Korean Public Procurement

SBOM preparation and organization

✅

✅

✅

Delivery and verification evidence

✅

✅

✅

Vulnerability analysis and history tracking

✅

✅

✅

Security reporting and evidence packaging

✅

✅

✅

License posture review

—

✅

✅

Check marks do not guarantee legal compliance; they only indicate areas where the capability may support readiness work.
Previous

Security & Policy

Next

FAQ