Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Core Infrastructure Initiative Gives Out Best Practices Badges

The Linux Foundation’s Core Infrastructure Initiative (CII) announced this week the names of the projects that received badges as part of its best practices program so far.

The Linux Foundation’s Core Infrastructure Initiative (CII) announced this week the names of the projects that received badges as part of its best practices program so far.

CII brings together technology companies and industry stakeholders with the goal of identifying and funding critical open source projects. The best practices badge program was announced in August 2015, when CII asked the open source community to establish a set of criteria that could be used to determine the security, stability and quality of open source software.Core Infrastructure Initiative

Open source software projects that want to show that they follow best practices can voluntarily self-certify by using the BadgeApp to explain how they follow best practices.

The list of projects that earned badges so far includes Node.js, the Linux kernel, GitLab, OpenSSL, Curl, OpenBlox, the Zephyr Project, and Syncthing. Tens of other open source apps are in the process of getting certified.

CII noted that OpenSSL failed to meet over one-third of the criteria before the existence of the Heartbleed bug came to light, but it currently scores 100%, which shows how much a project can evolve with support from the industry. It’s worth noting that CII was launched in 2014 in response to Heartbleed.

“Open source projects often have very good security practices in place but need a way to validate those against industry and community best practices and ensure they’re always improving,” said Nicko van Sommeren, CTO of The Linux Foundation. “Thanks to the generous contributions by the Core Infrastructure Initiative supporters, we’re able to provide this program to educate developers on security best practices and provide a directory for developers and CIOs to understand what projects have an understanding and methodology that focuses on security.”

The first app to meet all the criteria was the BadgeApp itself, whose developers have described in detail how they approach security in design, implementation, verification, supply chain, development environment, and deployment.

CII is supported by 20 major tech companies, including AWS, Adobe, Cisco, Dell, Google, HP, IBM, Intel, Microsoft, Qualcomm, RackSpace and VMware.

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

Web scraping is a sensitive issue. Should a third party be allowed to visit a website and use automated tools to gather and store...

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...