TMCnet News

Fortify advises companies to code audit open source applications before deployment
[December 23, 2009]

Fortify advises companies to code audit open source applications before deployment


(M2 PressWIRE Via Acquire Media NewsEdge) Following Sun Microsystems' decision to release a raft of open source applications to support its secure cloud computing strategy (http://bit.ly/7qrbou), Fortify Software is recommending companies conduct extensive security tests of their customised open source software before deployment.



"Given the significant savings to be had from using open source applications, Sun's strategy is a security testing at all stages in the customisation process," said Richard Kirk, European Director with the application vulnerability specialist.

"It's also good to see Sun announcing its support for the new security guidance from the Cloud Security Alliance, since this means that its open source apps will support the best practice guidelines, which is essential when supporting a private cloud infrastructure," he added.


According to Kirk, whilst the use of encryption and VPNs to extend a secure bridge between a company IT resource and a private cloud facility is very positive - especially now that Amazon is best testing its pay-as-you-go private cloud facility (http://bit.ly/Kojyo) - it's important that the underlying application code is also secure.

Security in any IT resource, he explained, is only as strong as the weakest link, so it's just as important to secure the source code of the software being used as it is to defend the cloud environment, as well as other aspects of a company's IT systems.

"Sun's strategy in opting for open source cloud security tools - including OpenSolaris VPC Gateway, Immutable Service Containers, Security Enhanced Virtual Machine Images and a Cloud Safety Box - is excellent news on the private cloud security front," he said.

"Even so, if businesses go down this route, it's critically important that they invest some of the costs saved by taking the open source path, in security at the program code development and customisation stages. This will help them to create an even more robust solution," he added.

((Comments on this story may be sent to [email protected])) (c) 2009 M2 COMMUNICATIONS

[ Back To TMCnet.com's Homepage ]