Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Linux Foundation’s CII Now Assessing Open-Source Project Risk

    By
    Sean Michael Kerner
    -
    July 10, 2015
    Share
    Facebook
    Twitter
    Linkedin
      Linux

      In the aftermath of the Heartbleed security vulnerability in April 2014, the Linux Foundation set up the Core Infrastructure Initiative (CII) to help fund and support critical open-source projects. Now more than a year later, CII is funding the Census Project to better identify and score potentially vulnerable open-source projects that could benefit from CII’s support.

      To date, CII has been assessing projects in need but has realized that a common method and deep assessment of code bases is required to truly identify the projects most in need, Emily Ratliff, senior director of Infrastructure Security at Linux Foundation, said. To date, CII has helped fund multiple projects, including OpenSSL, and announced $452,000 in funding in June for three open-source projects to help improve code quality.

      “What’s new is that the Census Project quickly automates the collection and analysis of data on different open-source projects and ultimately creates a risk score for each project based on the results,” Ratliff told eWEEK. “The goal is that this program will expedite CII’s decision-making around grant proposals, ensuring funds are delivered as fast as possible to the software most in need.”

      Ratliff herself only recently took on a leadership role in CII as a dedicated resource helping to guide the effort forward.

      Ratliff explained that the new risk score for open-source projects is calculated by the Census program based on a number of parameters, including the number of contributors and previously disclosed Common Vulnerabilities and Exposures (CVE) vulnerability identifiers. The risk score calculation is done as an open-source effort, and Ratliff is hopeful that individuals will submit suggestions and improvements to the heuristics to improve the calculation of the score.

      “We will rerun the Census periodically to see how project scores change over time, which will happen in large part due to changes in the contributor count, the project’s popularity and the CVE count,” she said. “We are really hoping that this project will open the dialogue around appropriate metrics for assessing open-source project risk.”

      The Census Project does not, however, have a mandate to perform static or dynamic code analysis to examine application code for any vulnerabilities. Ratliff said that CII expects open-source developers to use static and dynamic analysis types of tools and perform analysis themselves.

      “If they are doing this type of analysis, then their risk score should be reduced over time,” she said.

      There have been multiple efforts over the past decade to help open-source projects conduct static analysis on code. One of those efforts is Coverity Scan, which first got started in 2008 thanks in part to a grant from the U.S. Department of Homeland Security (DHS).

      A goal of the Census Project is to help identify open-source projects in need of support, though Ratliff noted that there is no specific funding formula in place that is directly correlated to the risk score.

      “All funding will be proposed and approved by individuals based on actual project need,” she said. “The goal of the Census Project is to quickly filter projects to the front of the queue for deeper evaluation by the members and advisory board.”

      While CII will help fund projects to fix flaws and improve security, Ratliff said CII does not have any plans in place to reward security researchers for disclosing flaws through some form of bug bounty program. Bug bounty programs have become increasingly popular in recent years with multiple technology vendors, including Yahoo, Google, Mozilla and Facebook.

      There is still a lot for CII to do in the months ahead, according to Ratliff.

      “We remain focused on our mission to identify and support the world’s most critical open-source infrastructure,” she said. “We will also be establishing a set of best practices for open-source development as it relates to security. Look for details on this in the coming months.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×