Skip to content

Perforce Launches New State of Open Source Survey in Collaboration With the Eclipse Foundation and Open Source Initiative

MINNEAPOLIS, SEPTEMBER 17, 2024 – Perforce Software, the DevOps company for global teams requiring speed, quality, security and compliance at scale along the development lifecycle, today launched its annual survey exploring open source software (OSS) usage in organizations worldwide. The survey’s findings will be the foundation for the 2025 State of Open Source Report, which offers a comprehensive assessment of the current landscape of OSS technologies and trends. This year’s survey was developed through a joint effort led by OpenLogic by Perforce in collaboration with the Eclipse Foundation and the Open Source Initiative (OSI). 

“We are delighted to partner once again with both the Eclipse Foundation and Open Source Initiative,” said Tzvika Shahaf, VP of Product Management at Perforce. “This year, we have added a new section on Big Data infrastructure, since data technologies was identified as one of the biggest areas of investment in the 2024 report. We hope to gain a better understanding of how enterprises are managing their Big Data stacks and the challenges they face.”

The survey, which will close on November 1, asks questions related to the day-to-day use and management of OSS, as well as governance and maturity. Response data will be compiled into a detailed report, with sections focused on different technology categories (i.e. operating systems, databases, programming languages) and topics such as security and compliance. 

The Eclipse Foundation is proud to participate in the 2025 State of Open Source survey and report. We view it as essential to our work of championing open source development and innovation,” said Thabang Mashologu, VP of Community and Outreach at the Eclipse Foundation. “The State of Open Source Report always provides invaluable insights that enable us to better support our community of open source contributors and organizations that rely on OSS for their business-critical applications.”

Since it was first published in 2019, the State of Open Source Report has been cited in numerous industry reports, as well as shared at top open source conferences around the world.

“This is our fourth year being involved in the State of Open Source Report, and there is never any shortage of surprises in the data,” said Stefano Maffulli, Executive Director, Open Source Initiative. “Now, however, the aim of the survey is not to determine whether or not organizations are using open source — we know they are — but to find out how they are handling complexities related to AI, licensing, and of course, security.”

Anyone using open source in their organization is invited to complete the 2025 State of Open Source Survey

About the Eclipse Foundation
The Eclipse Foundation provides our global community of individuals and organizations with a business-friendly environment for open source software collaboration and innovation. We host the Eclipse IDE, Adoptium, Software Defined Vehicle, Jakarta EE, and over 425 open source projects, including runtimes, tools, specifications, and frameworks for cloud and edge applications, IoT, AI, automotive, systems engineering, open processor designs, and many others. Headquartered in Brussels, Belgium, the Eclipse Foundation is an international non-profit association supported by over 350 members. To learn more, follow us on social media @EclipseFdn, LinkedIn or visit eclipse.org.

 

About the Open Source Initiative
The Open Source Initiative (OSI) is the steward of the Open Source Definition, setting the foundation for the global open source ecosystem. Founded in 1998, OSI protects and promotes open source software, development and communities, championing software freedom in society through education, collaboration and infrastructure. The OSI is a 501(c)3 non-profit, and anyone interested in supporting the defense of Open Source Definitions can join today at https://join.opensource.org.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

New Microsoft macOS Flaws: What MSPs Are Doing to Keep You Safe

Key Takeaways:

  • Critical Vulnerabilities Discovered: New security flaws in Microsoft macOS apps could potentially grant hackers unrestricted access to sensitive systems, posing a significant threat to businesses using these platforms.
  • Increased Risk to Organizational Data: If exploited, these vulnerabilities could allow cybercriminals to bypass security protocols, leading to unauthorized access, data breaches, and severe financial and reputational damage.
  • The Vital Role of MSPs: Managed Service Providers (MSPs) are essential in keeping businesses secure by regularly updating systems, implementing robust cybersecurity measures, and responding swiftly to new threats.

Intro

With digital threats ever-present, the recent identification of significant flaws in Microsoft macOS applications highlights the urgent demand for strong cybersecurity protocols. Managed Service Providers (MSPs) are actively protecting businesses against potential exploitation, ensuring organizational safety from cyber threats. Grasping these vulnerabilities, their consequences, and the essential role of MSPs aids businesses in managing the intricate cybersecurity environment of today.

The Emergence of Critical Vulnerabilities in Microsoft macOS Apps

The cybersecurity landscape has been jolted by the revelation of critical vulnerabilities in Microsoft’s macOS applications. These flaws have the potential to open a backdoor for cybercriminals, granting them unrestricted access to sensitive systems and data. Microsoft has continually strived to fortify its security measures, but this latest discovery underscores a critical reality: no platform is immune to sophisticated cyber threats. As businesses increasingly rely on Microsoft’s macOS apps for their daily operations, the urgency to address these vulnerabilities becomes paramount. This situation highlights the rapid pace at which cyber threats evolve, outpacing even the most robust security measures. Organizations must recognize the inherent risks associated with these vulnerabilities, which could lead to unauthorized data access, theft, and a slew of malicious activities. The impact on businesses could be far-reaching, with potential financial repercussions and long-term damage to reputation. The emergence of these vulnerabilities serves as a stark reminder of the dynamic nature of cyber threats, emphasizing the need for businesses to remain vigilant and proactive in their cybersecurity efforts.

Understanding the Impact of These Vulnerabilities on Businesses

The ramifications of these vulnerabilities for businesses reliant on Microsoft’s macOS applications are profound. When cybercriminals exploit these flaws, they can bypass existing security measures and gain unauthorized access to sensitive data. This kind of breach can trigger a cascade of negative outcomes, including significant financial losses and irreparable harm to a company’s reputation. Regulatory penalties could further compound the financial strain, while the erosion of customer trust can lead to a long-term decline in business. Operational disruptions might also ensue, potentially halting key business functions for extended periods. In a landscape where data integrity is paramount, the exploitation of such vulnerabilities could undermine competitive advantage, impede strategic goals, and necessitate costly and time-consuming remediation efforts. Consequently, robust cybersecurity protocols are essential not just for protecting data but for preserving the very fabric of an organization’s operational stability and market standing.

The Role of MSPs in Cybersecurity Management

Managed Service Providers (MSPs) play a pivotal role in the cybersecurity ecosystem, offering an indispensable layer of protection for businesses, especially those without dedicated in-house IT security teams. By leveraging MSPs, organizations can tap into a pool of specialized knowledge and cutting-edge technologies designed to safeguard against cyber threats. MSPs provide continuous monitoring and management of IT systems, ensuring they are fortified with the latest security patches and protocols. This proactive stance allows them to detect and address vulnerabilities before they can be exploited, maintaining a secure digital environment for their clients.

MSPs excel in their ability to offer tailored solutions that meet the unique security needs of different organizations. Their expertise extends to implementing advanced cybersecurity frameworks, such as intrusion detection systems and firewalls, that form the backbone of a robust defense strategy. Additionally, MSPs perform regular security audits to identify potential weaknesses and ensure compliance with industry standards and regulations.

Beyond technological safeguards, MSPs also focus on the human element of cybersecurity. They provide comprehensive training programs to educate employees on best practices and the latest threat vectors, minimizing the risk of human error leading to breaches. This holistic approach ensures that every facet of an organization’s digital ecosystem is protected.

By staying abreast of the latest developments in the cybersecurity landscape, MSPs can swiftly adapt their strategies to counter new and emerging threats. This agility, combined with their deep expertise and proactive measures, makes MSPs an invaluable ally in the ongoing battle to secure organizational data and maintain operational integrity.

Strategies MSPs Use to Identify and Mitigate Cyber Threats

MSPs deploy a multifaceted approach to shield organizations from cyber threats. One key strategy is continuous monitoring of network activity, which enables real-time detection of anomalies that could indicate potential breaches. This vigilance allows for swift action, mitigating risks before they escalate. Regular system audits are another cornerstone, helping to identify and rectify vulnerabilities ahead of any exploitation. Advanced cybersecurity frameworks, including robust firewalls and sophisticated intrusion detection systems, form the bedrock of their defense tactics. These tools are complemented by the implementation of stringent security protocols that are consistently updated to counter new threats. Additionally, MSPs recognize the crucial role of human factors in cybersecurity. They offer comprehensive training programs designed to educate employees on the latest threat vectors and best practices, significantly reducing the risk of human error leading to breaches. By integrating these diverse strategies, MSPs create a fortified digital environment that proactively defends against a wide array of cyber threats.

Staying Ahead of Emerging Cyber Threats

The digital threat landscape is in a constant state of flux, making it imperative for businesses to stay ahead of emerging cyber threats. MSPs play a critical role in this ongoing battle by leveraging advanced technologies and methodologies to predict and counteract potential risks. One of the key strategies employed by MSPs is the use of artificial intelligence and machine learning to identify patterns and anomalies that could signal new types of cyberattacks. These advanced analytics tools provide real-time insights, allowing for preemptive measures that neutralize threats before they can cause harm.

Moreover, MSPs maintain a rigorous schedule of threat intelligence updates. By subscribing to global threat intelligence feeds, they stay informed about the latest vulnerabilities, attack vectors, and cybercriminal tactics. This information is then used to adjust and fortify security protocols dynamically, ensuring that defenses are always one step ahead. Additionally, MSPs collaborate with cybersecurity communities and forums to share knowledge and gain insights from other experts in the field, fostering a collective defense against sophisticated attacks.

Another crucial aspect of staying ahead involves continuous employee education. MSPs conduct regular training sessions that focus on the latest threat vectors and security best practices. This not only equips employees with the knowledge to identify and avoid potential threats but also fosters a culture of cybersecurity awareness throughout the organization. By combining technological innovation with human vigilance, MSPs create a comprehensive defense strategy that is both adaptive and resilient.

Ultimately, the proactive measures taken by MSPs serve as a critical buffer, ensuring that businesses are not just reacting to threats but are actively prepared to counteract them.

The Essential Partnership Between Businesses and MSPs

The relationship between businesses and MSPs extends beyond a mere service agreement; it is a strategic alliance rooted in mutual trust and a shared commitment to cybersecurity. MSPs bring specialized knowledge, state-of-the-art technologies, and proactive monitoring to the table, offering a level of protection that most organizations would struggle to achieve on their own. For businesses, engaging with an MSP means gaining access to a dedicated team of experts who are constantly vigilant, ensuring that systems are secure and compliant with the latest industry standards.

A key aspect of this partnership is the seamless integration of MSPs into a business’s existing operations. This includes not just the deployment of technical solutions, but also continuous education and training for employees, fostering a culture of cybersecurity awareness throughout the organization. MSPs work closely with businesses to tailor security strategies that align with specific needs and risk profiles, providing a customized defense against cyber threats.

Open communication is another cornerstone of this relationship. Regular updates and transparent reporting from MSPs keep businesses informed about their security posture, potential vulnerabilities, and ongoing efforts to mitigate risks. This collaborative approach ensures that both parties are aligned in their objectives, creating a resilient framework capable of adapting to the ever-changing cyber threat landscape.

At Guardz, we understand the critical role MSPs play in the cybersecurity ecosystem. That’s why we have forged strong partnerships with MSPs to provide comprehensive security solutions tailored to their clients’ unique needs. By leveraging our advanced cybersecurity platform, MSPs can offer their clients robust protection against emerging threats, such as the recently discovered vulnerabilities in Microsoft macOS apps. Guardz equips MSPs with the tools and insights they need to monitor, manage, and mitigate risks effectively, ensuring that their clients’ digital assets remain secure in an increasingly hostile cyber environment. With Guardz, MSPs can confidently protect their clients while enhancing their service offerings, ultimately delivering peace of mind and security at every level.

Conclusion: Ensuring Resilience in the Face of Cyber Adversity

The recent vulnerabilities in Microsoft’s macOS applications serve as a crucial reminder of the ever-present cyber threats that businesses face. Managed Service Providers (MSPs) stand at the forefront of cybersecurity, offering the expertise and proactive measures necessary to counteract these risks. By partnering with MSPs, businesses can leverage advanced technologies and continuous monitoring to stay ahead of emerging threats. This collaboration fosters a resilient digital environment, allowing organizations to focus on their core operations without compromising on security. In this dynamic threat landscape, maintaining robust cybersecurity protocols and engaging with knowledgeable MSPs are essential steps in safeguarding your business’s future.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

Understanding SaaS compliance: key standards and best practices

Software as a Service (SaaS) has become the backbone of many businesses, offering scalable and cost-effective solutions for various industries. However, with the convenience of SaaS comes the critical responsibility of ensuring SaaS compliance with industry standards and data protection laws.

For those new to SaaS, understanding SaaS compliance can be daunting, but it is crucial for protecting sensitive data, building customer trust, and avoiding legal pitfalls. This guide will walk you through the basics of SaaS compliance, covering key standards, common challenges, and best practices to help you keep your business on the right track.

What is SaaS compliance? 

SaaS compliance means that software-as-a-service providers have to follow various regulatory requirements, laws, and industry-specific standards. These standards are designed to protect sensitive data, ensure financial transparency, and maintain security protocols across cloud-based services. For SaaS providers, compliance is not just a legal obligation but is also about demonstrating their commitment to safeguarding customer data and upholding industry benchmarks.

For instance, consider a company that offers cloud-based solutions for managing healthcare records. To operate legally and securely, the company must comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets strict standards for protecting sensitive patient information. Without HIPAA compliance, the company could face fines, lose customers, and suffer reputational damage.

Why is SaaS compliance important?

Understanding why SaaS compliance is important is crucial for any business operating in the SaaS space. Compliance serves two primary purposes: protecting data security and maintaining customer trust.

Data security

With data breaches becoming an everyday threat, robust SaaS compliance practices help SaaS providers safeguard their customers’ data against security risks. Compliance frameworks like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) impose stringent requirements on how companies collect, store, and process personal data. Failure to comply can lead to severe penalties and legal consequences.

For example, in 2023, Meta was fined $1.3 billion for GDPR violations. The company failed to ensure adequate protections for user data during transfers between the EU and the U.S. This shows how important it is to prioritize data security and compliance to avoid substantial legal penalties.

Customer trust

Compliance also plays a crucial role in building and maintaining customer trust. When customers know that a SaaS provider follows compliance frameworks like PCI DSS (Payment Card Industry Data Security Standard) or SOC 2 (Service Organization Control 2), they feel more confident that their data is secure. This trust is essential for long-term business relationships and customer retention.

Risks of non-compliance

The risks of non-compliance are significant. They include legal penalties, financial loss, reputational damage, and operational disruptions. Companies that fail to meet compliance standards may also find it challenging to attract and retain customers as trust in their services diminishes. In extreme cases, non-compliance can lead to business shutdowns, especially if the violations are severe.

Key compliance standards for SaaS providers

To effectively manage compliance, SaaS providers must understand the types of SaaS compliance relevant to their industry. These compliance standards vary depending on the nature of the service, the type of data handled, and the geographical location of the customers. Here’s an overview of some major compliance frameworks.

Key compliance standards for SaaS providers

Financial compliance

Payment Card Industry Data Security Standard (PCI DSS)

PCI DSS is essential for any SaaS provider that handles payment card transactions. This standard outlines security measures to protect cardholder data, including data encryption, secure storage, and regular monitoring. Implementing solutions to become PCI compliant is crucial for preventing data breaches and maintaining customer trust.

Accounting Standards Codification (ASC 606)

ASC 606 provides guidelines for revenue recognition, ensuring that companies report their financial performance accurately. SaaS providers must comply with ASC 606 to demonstrate financial transparency and avoid legal issues related to revenue reporting.

Sarbanes-Oxley Act (SOX)

SOX compliance is mandatory for publicly traded companies, including SaaS providers. It focuses on corporate governance and financial reporting, requiring companies to implement internal controls and report on their effectiveness. Non-compliance with SOX can lead to severe penalties, including fines and imprisonment for executives.

Security compliance

Service Organization Control 2 (SOC 2)

SOC 2 compliance is a critical standard for SaaS providers that handle customer data. It ensures the company’s information security management systems meet industry standards. SOC 2 audits evaluate controls related to security, availability, processing integrity, confidentiality, and privacy. Achieving SOC 2 compliance is essential for demonstrating that your SaaS solutions are secure and reliable.

ISO/IEC 27001

ISO/IEC 27001 is an international standard for information security management systems. It provides a framework for managing and protecting sensitive information through a systematic approach. Implementing an ISO 27001 compliance solution can help SaaS providers safeguard their data, meet customer expectations, and improve overall security.

Center for Internet Security (CIS) Controls

The CIS Controls are a set of best practices for cybersecurity. They provide a prioritized set of actions to protect organizations from cyber threats. SaaS providers can use these controls to strengthen their security posture and reduce security risks, including breaches.

National Institute of Standards and Technology Cybersecurity Framework (NIST CSF)

The NIST CSF is a voluntary framework that provides guidelines for managing and reducing cybersecurity risks. SaaS providers can adopt it to enhance their security practices and ensure they are aligned with industry standards.

Data privacy compliance

General Data Protection Regulation (GDPR)

GDPR is a European Union regulation that governs how companies handle personal data. It applies to any SaaS provider that processes data belonging to EU citizens, no matter where the company is based. Compliance with GDPR is essential for avoiding hefty fines and protecting customer privacy. Companies can explore GDPR compliance services for tailored support.

HIPAA (Health Insurance Portability and Accountability Act)

HIPAA sets the standard for protecting sensitive patient information in the healthcare industry. SaaS providers that handle health-related data must comply with HIPAA to avoid penalties and ensure that patient information is kept confidential. Implementing HIPAA compliance solutions is vital for any SaaS provider operating in the healthcare sector.

CCPA (California Consumer Privacy Act)

The CCPA is a state law that grants California residents rights over their personal data. It requires businesses to disclose what information they collect, allow consumers to opt out of data sharing, and delete personal data upon request. SaaS providers must comply with CCPA to avoid legal penalties and maintain customer trust.

Data security and privacy regulations

Data security and privacy are at the heart of SaaS compliance. Data protection laws like GDPR, HIPAA, and CCPA are designed to protect individuals’ data from misuse and unauthorized access. These regulations require SaaS providers to implement strict security measures, such as data encryption, access controls, and regular monitoring, to ensure that data is protected at all times.

For example, a SaaS provider offering cloud storage services must ensure that data is encrypted at rest and in transit. This means that even if a malicious actor gains access to the data, they would not be able to read it without the decryption key.

Complying with data security and privacy regulations can help SaaS providers protect their customers’ information and avoid legal consequences.

Challenges in achieving SaaS compliance

Achieving SaaS compliance can be challenging for SaaS providers, especially those just starting. Here are some common challenges and potential solutions:

Complexity of regulations

SaaS compliance requirements can be complex and vary by industry and region. For example, a global SaaS provider may need to comply with multiple regulations, such as GDPR, CCPA, and HIPAA, each with unique requirements. To manage this complexity, SaaS providers can use SaaS compliance management tools that automate tracking and implementing regulatory requirements.

Resource constraints

Small and medium-sized SaaS companies often lack the resources for compliance efforts. Hiring compliance experts or outsourcing SaaS compliance can be expensive. However, non-compliance can be even more costly in the long run. To handle this, SaaS providers can focus on implementing the most critical compliance measures first and gradually expand their compliance efforts as their business grows.

Keeping up with changes

Compliance standards and data protection laws are constantly evolving, and SaaS providers must stay up-to-date with the latest changes to remain compliant. This requires continuous monitoring of regulatory updates and adjusting compliance practices as needed. An effective compliance strategy includes subscribing to industry newsletters, attending webinars, and participating in compliance forums to stay informed.

Benefits of SaaS compliance

While achieving SaaS compliance can be challenging, the benefits far outweigh the effort. Here are some key benefits:

Improved security

SaaS compliance ensures that providers implement robust security controls to protect customer data. This reduces the risk of data breaches and cyber-attacks, safeguarding both the company and its customers.

Enhanced customer trust

SaaS security compliance demonstrates to customers that their data is in safe hands, building trust and loyalty and leading to long-term customer relationships.

Competitive advantage

Compliant SaaS companies can differentiate themselves from competitors who may not offer the same level of security and privacy protection. This can be a significant selling point in a crowded market.

Best practices for maintaining SaaS compliance

Maintaining SaaS compliance is an ongoing process that requires constant attention. Here are some best practices to help:

Regular audits

Conduct internal and external audits regularly as part of your compliance strategy. Audits help assess your compliance status and identify any gaps in your security practices. They can also help you stay on top of compliance requirements and ensure that your SaaS solutions remain secure.

Employee training

Regularly train employees on SaaS compliance requirements and their role in maintaining it. An informed team is better equipped to follow measures and avoid potential compliance risks.

Usage of compliance management tools

Leverage compliance management tools to automate tracking and implementing regulatory requirements. These tools help reduce human error and ensure all compliance obligations are met. Additionally, use only SaaS-compliant tools for daily operations to create a secure environment and minimize risks. The more secure your operational tools, the stronger your overall compliance posture.

Document compliance efforts

Keep detailed records of your compliance activities, including policies, procedures, and audit results. This documentation is crucial during an audit or regulatory inquiry.

SaaS compliance checklist

To help you get started, here’s the SaaS compliance checklist of key steps.

SaaS compliance checklist

  • Identify applicable regulations: Determine which compliance standards (like GDPR, HIPAA, or PCI DSS) apply to your SaaS business

  • Implement security measures: Ensure your platform meets all security requirements, such as encryption and access controls

  • Conduct regular audits: Schedule regular audits to assess your compliance and identify areas for improvement

  • Train employees: Provide ongoing training to ensure employees understand their compliance responsibilities

  • Use compliance tools: Implement tools to automate and streamline your compliance tasks

  • Document compliance efforts: Keep detailed records of your compliance activities, including financial compliance measures and the implementation of security controls.

How can NordLayer help companies stay compliant?

NordLayer itself meets multiple compliance standards for securing applications and services, including GDPR, HIPAA, ISO 27001, and PCI DSS. Compliance often requires specific network security measures, such as traffic encryption, advanced network access control, and multi-factor authentication.

NordLayer addresses these needs by providing robust security features designed to meet these requirements. By integrating NordLayer, you can enhance the security of your SaaS solutions, ensuring they align with compliance standards and protect sensitive data effectively.

Conclusion

SaaS compliance is a critical aspect of running a successful software-as-a-service business. By understanding and adhering to key compliance standards, SaaS providers can protect their customers’ data, build trust, and avoid legal pitfalls. While achieving compliance can be challenging, the benefits—including improved security, customer loyalty, and competitive advantage—make it well worth the effort.

By following best practices and leveraging tools like NordLayer, you can navigate the complex world of SaaS compliance with confidence and ensure your business’s long-term success.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to find SonicWall devices on your network

Latest SonicWall vulnerability: (CVE-2024-40766) 

SonicWall disclosed a vulnerability that affects SonicOS management access and SSLVPN software on SonicWall Gen 5, Gen 6, in addition to Gen 7 devices running SonicOS version 7.0.1-5035 or earlier.

CVE-2024-40766 is rated critical with CVSS score of 9.3, and potentially allows for unauthorized resource access by an attacker. There is limited evidence that this vulnerability is being exploited in the wild.

What is the impact?

Successful exploitation of this vulnerability potentially results in unauthorized resource access and in some cases could lead to a DoS after causing vulnerable devices to crash.

Are updates or workarounds available?

SonicWall recommends restricting management access to trusted sources or disabling WAN management from the public Internet. Additionally, SonicWall has released updated firmware and is available for download from mysonicwall.com.

How to find potentially vulnerable systems with runZero

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

hw:"SonicWall" type:"Firewall"

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Linux Security Best Practices

Linux security is top of mind these days as CentOS Linux, one of the most popular open source Enterprise Linux distributions, just sunsetted its final version. No more updates or patches will be released from the community, and it is estimated that there are still tens of thousands of servers running end-of-life CentOS

Whether you are still on CentOS or on another Linux distro, knowing how to secure your Linux server is essential to protecting your systems and keeping unauthorized people and malicious code/malware out.

In this blog, read about Linux security best practices, including some setup/configuration “shortcuts” that can actually weaken your security and increase your risk.

Linux Security: Overview

There are many reasons why you should (or must) secure your Linux servers, but the top two that immediately come to mind are compliance and accountability. 

Compliance Requirements

There are a number of scenarios where securing your Linux server is mandatory. For example:

  • If you process or store any credit card information, there are requirements to secure your server.
  • If you handle medical data, there are HIPAA security requirements.
  • You may have security policies within your company that you need to adhere to.
  • If you interface with 3rd parties, there may be security agreements that all parties need to comply with.

If any of the above apply to your organization, securing your Linux server is not optional. 

Get more information about open source compliance >>

Accountability

  • Having tight security can furnish you with favorable answers when prospects or customers ask about your company’s security history, which is far better than the alternative (aka having a bad reputation due to lax security).  
  • If a security issue does occur, your company could be legally liable to have implemented certain security measures. 

Regardless of why you feel it is necessary to keep your Linux server secure (or how you justify it to others in your company), properly implemented Linux security measures will undoubtedly benefit your business beyond any potential inconveniences that may come to mind when security is mentioned.

Back to top

Common Linux Security Vulnerabilities 

When most people think about Linux vulnerabilities, they think of bugs in software which can result in potential security risks. Recently, CVE-2024-6387 and CVE-2024-6409 were disclosed, and both are vulnerabilities within the OpenSSH package on EL9 (and EL9-based distributions). Very few systems use insecure remote access methods like Telnet these days, but it used to be that you had a choice of having the default Telnet access and/or installing SSH. Luckily, SSH became the default for remote access, but it is still necessary to keep it up-to-date in order to continue enjoying the security that using it provides.

Security vulnerabilities can show up in almost any package. For instance, CVE-2021-43527 is a CVSS score 9.8 remote code execution vulnerability in nss, CVE-2022-25315 is a CVSS score 9.8 overflow/DoS/arbitrary code execution vulnerability in expat, and CVE-2021-35942 is a CVSS score 9.1 overflow/arbitrary memory read vulnerability in glibc. Last year, the high severity Looney Tunables vulnerability (CVE-2023-4911) impacted numerous Linux distributions including CentOS 8, and a critical libwebp vulnerability (CVE-2023-4863) allowed essential heap data structures to be overwritten in CentOS 7 and 8, as well as other open source software that uses the popular code library (NGINX, WordPress, Node.js, and others). 

Note: OpenLogic provides CentOS patches for CVEs with CVSS score of 7 or higher for our CentOS LTS customers.

Vulnerabilities (and the bad actors that exploit them) are somewhat beyond our control — but there are other things that can weaken Linux security we can address. I’m talking about choices that get made to save time/effort and make implementation easy, or issues that are do not seem high priority enough to get taken care of in a timely manner. 

Here are a few examples:

  • Using passwordless ssh keys so you don’t have to type your password over and over each day or having the system auto-login when it boots (“Nobody is allowed to touch my workstation.”)
  • Leaving root logged in at the console (“I’m the only one who comes into the data center.”)
  • Turning off SELinux (“It’s too difficult to get it working properly.”)
  • Not updating some or all of the packages on a system (“It’s working right now and I don’t want to risk breaking anything.”)
  • Leaving accounts on a system after an employee has left the company (“They can’t get into our network anymore so there’s no rush to remove their accounts.”)
  • Keeping mission-critical systems running on End-of-Life distributions (“I have too many other things on my to-do list and these have been working just fine for years!”)

Main point: cutting corners when it comes to Linux security is never a good idea and can come back to haunt you.

Back to top

8 Steps to Secure Your Linux Server

In addition to not doing any of the shortcuts above, here are 8 best practices that you should consider:

  1. Harden systems to specific security standards (CIS Benchmarks, PCI-DSS, STIG, etc.) 

Even if there aren’t any explicit requirements to do this, it’s a good idea. This can be made easier by using pre-hardened images. These images can either be created in-house or obtained from a trusted 3rd party like OpenLogic.

Most benchmarks will test and configure the system through hundreds of checks, such as automatically disconnecting idle sessions, and raise flags if auto-login is enabled, or accounts without passwords are detected, and so on. 

    2. Use (and require) strong passwords

Social media is filled with fun little quizzes about your pet’s name, your childhood address, what year you were married, and so forth. First of all, don’t fall for these social engineering tricks that try to get you to share information commonly used in passwords or security questions. If you do accidentally share info like this, a strong password means hackers won’t have enough information to easily figure out how to access your accounts.

Security benchmarks typically configure the system to enforce this, too.

    3. Keep systems updated

You not only need to keep the OS updated but also all of the apps (and any dependencies) on the system.

The fear of breaking something due to an update can be alleviated by having a lab/staging environment where you can test updates (and other changes) in isolation before deploying to production.

If a lab/staging environment is not available, consider a phased deployment to a few systems that, if problems occur, can be taken offline, repaired, and then brought back online.

    4. Plan to migrate systems before they reach end of life (EOL)

True Enterprise Linux distributions have known lifecycles from release through end of life. This information can be used to plan when to upgrade from one OS to another from the start instead of near (or after) the published EOL date.

If they do reach EOL, procure long-term support for the OS and packages/services (such as the CentOS support available from OpenLogic for 5 years after the EOL date).

    5. Implement MFA (Multi-Factor Authentication)

MFA adds another layer of access security for each account so a misplaced Post-It note with your new password on it or a lost thumb drive that contains an SSH key doesn’t automatically allow access to whomever sees/finds it.

    6. Use system configuration to deploy and validate configuration and security consistently

Not only can tools like Ansible or Puppet help with the initial launch of your systems, they can also be used to maintain ongoing compliance and updates of those systems, and reduce MTTR in Disaster Recover (DR) situations in the event that systems need to be rebuilt from scratch.

Comparing configuration management tools for enforcing Linux security? Here’s what to know about Ansible vs. Puppet >>

    7. Incorporate SELinux from the start (and don’t disable it or leave it in passive mode)

The most common SELinux-related problems that are difficult to resolve are due to development and testing (and sometimes, staging) being done with SELinux disabled and the placement of files and directories being where SELinux doesn’t know how to handle them. Then, when SELinux is finally enabled (typically in staging but sometimes in production), everything breaks and SELinux is disabled again and left that way. By placing your files in locations that adhere to SELinux’s expectations, local SELinux policies can be minimized or eliminated.

    8. Stay on top of account maintenance

By incorporating centralized authentication such as some combination of FreeIPA, Directory Services, SSO, Kerberos, and RADIUS, it becomes very easy to activate, deactivate, or update accounts and their permissions. Most high-end network gear also supports centralized authentication so your entire infrastructure can be secured the same way.

If you don’t have centralized authentication, use tools (like the aforementioned Ansible or Puppet) to keep accounts stored locally on each system in-sync.

Back to top

Final Thoughts 

Unfortunately, there is no shortage of bad actors looking to compromise your system to steal data or otherwise cause harm to your business. Having a secure Linux server and strong Linux security measures means you can sleep well at night because you’re not worried about all of the potential attacks that you have no defenses against, and you’re not prepared for. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×