Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Guest
on 9 April 2020

Ubuntu Core: an independent security analysis


This is a guest blog by Trent R.Hein, Co-CEO of Rule 4.

Once in a while an opportunity comes along that brings out our inner geek like no other, which is what happened when Canonical asked if we’d be willing to review the overall cybersecurity model of Ubuntu Core and its ecosystem. We’re no strangers to operating system security — we’ve been hands-on operating system cybersecurity practitioners and contributors dating back to the 1990s, with Berkeley (BSD) Unix and early Intel/embedded variants such as BSD/OS, and in more recent years on embedded Linux platforms for mission-critical devices ranging from card access control systems to medical devices and traffic lights.

One of the challenges we often run into is that the traditional focus on a wide array of user-centric features has resulted in Linux distributions that are easy-to-use and incredibly powerful, but not well-suited for purpose-specific uses such as appliances and IoT/Industrial IoT (IIoT) devices. Specialized embedded OSs have been available for many decades, but typically have suffered as “closed” products where functionality was limited and enhancements were highly dependent on the vendor. Even more problematic is the lack of “fleet management” functionality. Typically, the embedded OS was installed when the device was shipped, and barring some herculean effort, that same version and functionality were likely still on the device when it went to its grave. 

Canonical encouraged us to look at every aspect of Ubuntu Core and its ecosystem to validate the strengths of its cybersecurity controls and identify any potential deficiencies in its architecture. Using a combination of meticulous threat mapping and hands-on technical testing of controls and behaviors, we developed a thorough understanding of the cybersecurity attributes of the ecosystem. All of our testing was performed independently and provides an unbiased third-party perspective on risks within the Ubuntu Core ecosystem.

You can read the details of what we tested, our findings, and our recommendations in the full white paper.

The TL;DR version is that Ubuntu Core represents a significant step forward in providing a secure, holistic approach — it brings all of the power of the Linux and snap world to the developer’s fingertips, while providing just enough structure and power through fine-grained security controls, hardening, and sandboxing in a platform that provides for long-term fleet lifecycle management. Together, these attributes form a security arbitrage that is a win-win for the IoT world.

Related posts


Rhys Knipe
12 June 2024

Space pioneers: Lonestar gears up to create a data centre on the Moon

Canonical announcements Article

Why establish a data centre on the Moon? Find out in our blog. ...


Gabriel Aguiar Noury
6 June 2024

A look into Ubuntu Core 24: Your first Linux-powered Matter device

Internet of Things Article

Welcome to this blog series which explores innovative uses of Ubuntu Core. Throughout this series, Canonical’s Engineers will show what you can build with this Core 24 release, highlighting the features and tools available to you.  In this third blog, Farshid Tavakolizadeh, engineering manager from our Industrial team, will show you how t ...


Gabriel Aguiar Noury
5 June 2024

A look into Ubuntu Core 24: Robotics telemetry for your fleet

Internet of Things Article

Welcome to this blog series which explores innovative uses of Ubuntu Core. Throughout this series, Canonical’s Engineers will show what you can build with this Core 24 release, highlighting the features and tools available to you.  In this fourth blog, Mirko Ferrati, engineering manager from our Robotics team, will show you how to deploy ...