Is open-source as secure as proprietary software? | Ubuntu (2024)

We’re surrounded by news of data breaches and companies being compromised, and the existential threat of ransomware hangs over just about every organisation that uses computers.

One of the consequences is that we are hassled by an ever-increasing number of software updates, from phones and computers to vacuum cleaners and cars; download this, restart that, install the updates. Most of these devices and tools run open-source components: in a 2022 open source security and risk analysis report, Synopsys found that out of 17 industry verticals, 93% of codebases included open-source software.

Are the security issues we are seeing related to the use of open-source software? Does proprietary software have any more inherent safety or security benefits?

The short answer is no. More and more security flaws are being found simply because there is more software being produced in the world than ever before, and more aspects of our lives are incorporating software features.

In fact, open-source software has been at the forefront of this technological transformation, giving anyone in the world the access and opportunity to develop functionality and products that would have been infeasible without free access to such resources.

Obscurity is not security

Programmers generally write their source code for two audiences. First, for the computers that are going to execute the code. Second, for other programmers to update, adapt and maintain the code at a later date. It is this second aspect which gives open-source software its broad appeal: everyone is able to see the code, understand it, and use it safely in the knowledge that they understand it.

For the computers though, the code is compiled into a machine-readable form that the CPU can process and execute directly. This machine language is much harder for real people to understand: though it is still possible to look at what the program is doing, it is significantly more difficult and time-consuming to do so, which leads to a popular belief that this makes it more secure.

However, obscurity is not security, and there are plenty of motivated individuals who like nothing better than the challenge of disassembling a compiled program to study its inner workings.

Keeping open source projects secure is hard work that requires vigilance and a secure development foundation on which to build. If you want to learn more about Canonical’s stack of open source products and how they play a role in securing projects, programs, and products of all kinds, you can visit our secure open source page, where we outline how Canonical’s range of open source products are designed with security as a core focus. We also discussed this topic in extensive depth in episode 185 of the Ubuntu Security Podcast.

How do you consume open source securely?

Open-source software does have vulnerabilities, just the same as proprietary or closed-source software. Software vendors within both paradigms are equally beholden to keeping on top of the vulnerability reports, issue patches and fixes, and keeping their users safe. But there are some best practices you can apply to mitigate risks.

Synopsys discovered in their 2022 analysis that 85% of codebases contained open source that was more than four years out-of-date. Whether code is open or proprietary, the most crucial security measure is patching and updating that software, and the best way to do this is to consume the software from a trusted source which provides strong security maintenance commitments.

This enables you and your customers to remain safe from newly discovered threats. If and when vulnerabilities are discovered, you can rely on experts to fix them before attackers can exploit them.

Defence in depth

Another important aspect is to maintain defence in depth for your software platforms, so that if one particular component of the stack is vulnerable, an attacker can’t gain a foothold and spread their malfeasance any further. This can be achieved by hardening your systems, locking down the configuration options and removing unnecessary components that might aid a malicious actor.

Summary

All software systems have vulnerabilities and weaknesses, regardless of their development methodology, and the majority of cloud platforms rely on open-source security every day.

The biggest step to keep systems secure is to use software that is actively maintained and updated. The next step is to raise the bar for security by hardening your systems and preventing one small weakness turning into a full-blown nightmare.

Learn more about Canonical’s wide range of security enabling open source tools by visiting our dedicated secure open source page.

Is open-source as secure as proprietary software? | Ubuntu (2024)
Top Articles
Avis Lynx Broker 2024 - Broker Fiable ou Pas ? en mars 2024
CFD Trading Betrug oder seriös: Trading Anfänger Tipps 2024
Antisis City/Antisis City Gym
Repentance (2 Corinthians 7:10) – West Palm Beach church of Christ
Mrh Forum
What are Dietary Reference Intakes?
THE 10 BEST Women's Retreats in Germany for September 2024
Wells Fargo Careers Log In
Kentucky Downs Entries Today
Craigslist Pets Sac
Cooking Fever Wiki
Healing Guide Dragonflight 10.2.7 Wow Warring Dueling Guide
Seattle Rpz
charleston cars & trucks - by owner - craigslist
Chelactiv Max Cream
Unterwegs im autonomen Freightliner Cascadia: Finger weg, jetzt fahre ich!
Vegito Clothes Xenoverse 2
Why do rebates take so long to process?
67-72 Chevy Truck Parts Craigslist
Aes Salt Lake City Showdown
Play It Again Sports Norman Photos
Weve Got You Surrounded Meme
Surplus property Definition: 397 Samples | Law Insider
Stihl Dealer Albuquerque
Deshuesadero El Pulpo
2021 MTV Video Music Awards: See the Complete List of Nominees - E! Online
Hesburgh Library Catalog
Malluvilla In Malayalam Movies Download
Access a Shared Resource | Computing for Arts + Sciences
Ewg Eucerin
Chadrad Swap Shop
Walter King Tut Johnson Sentenced
Where Do They Sell Menudo Near Me
Craigslist Albany Ny Garage Sales
The Blackening Showtimes Near Regal Edwards Santa Maria & Rpx
Dying Light Nexus
Albertville Memorial Funeral Home Obituaries
Is The Nun Based On a True Story?
15 Best Things to Do in Roseville (CA) - The Crazy Tourist
18 terrible things that happened on Friday the 13th
Xxn Abbreviation List 2023
Ukraine-Krieg - Militärexperte: "Momentum bei den Russen"
Ezpawn Online Payment
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Lyndie Irons And Pat Tenore
Ehome America Coupon Code
Random Animal Hybrid Generator Wheel
Erespassrider Ual
Costner-Maloy Funeral Home Obituaries
North Park Produce Poway Weekly Ad
Bellin Employee Portal
Affidea ExpressCare - Affidea Ireland
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 5817

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.