Checked

Enterprise Security

From Kicksecure
Jump to navigation Jump to search

A discussion of the definition of "enterprise security" in computing.

While the idea of achieving enterprise security is appealing, it comes with a lot of unexpected drawbacks. Namely high costs for certifications and little actually tangible security improvements that couldn't or wouldn't be achieved otherwise.

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Build Integrity & Transparency Features
Feature Description Kicksecure Most [1] Enterprise Linux Distributions
Protection from supply chain attacks Mandates digital signature verification at all stages of development. This includes source code commits, git tags, the build process, and final downloads. Execution or deployment of unsigned code is strictly forbidden. The policy helps prevent supply chain attacks by ensuring the authenticity and integrity of software throughout its development and distribution. Yes [2] No [3]
Signed (ISO) images downloads All downloads are cryptographically signed, allowing users to verify the authenticity and integrity of releases. Yes [4]
Signed software packages are verified by the package manager Yes Yes
Documentation encourages users to perform digital software signature verification Verifying Software Signatures is consistently pointed out in documentation. Yes [5] No
Certification Cybersecurity validations and certifications, product compliance No [6] Yes [7]
Kernel livepatching kpatcharchive.org iconarchive.today icon No [8] Yes
Community support Yes [9] Yes [10]
Enterprise support Onboard new companies, answer questions, resolve issues at scale according to a service agreement. No Yes [11]
Professional 24/7 support Access to support engineers 24x7 for high-severity issues according to service agreement. No Yes
Extended LTS long-term support (5 years) by vendor No Yes
Extended LTS long-term support (5 - 19 years) by vendor No Yes [12]

See Also

[edit]

Footnotes

[edit]
  1. This is to avoid saying "all". None where this does not apply was known to the author at time of writing.
  2. Digital Signature Policy
  3. Usually does not have a Digital Signature Policy.
  4. Some provide only sha256 checksum files. No file signed by tools such as gpg, signify and/or codecrypt.
  5. Digital Signature Policy
  6. Dev/certification
  7. https://debconf24.debconf.org/talks/91-linux-live-patching-in-debian/archive.org iconarchive.today icon
  8. Community Support
  9. https://www.reddit.com/r/redhatarchive.org iconarchive.today icon
  10. Maintain system consistency with up to 19 years of support.SUSE Linux Enterprise Long Term Service Pack Supportarchive.org iconarchive.today icon


Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!