EgyptFOSS
حمل تطبيقاتنا للموبايل
حمل تطبيقاتنا للموبايل للمشاركة والحصول على جديد منصة مصر للبرمجيات الحرة مفتوحة المصدر.‎
Jump to: navigation, search
Revision as of 11:58, 14 July 2016 by M.nabil (Talk | contribs) (Created page with "It’s incumbent on developers, project team leaders, IT managers, CIOs, line of business owners, all the way up to C-level executives to ensure that there are sound strategie...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

It’s incumbent on developers, project team leaders, IT managers, CIOs, line of business owners, all the way up to C-level executives to ensure that there are sound strategies and tactics in place to make it easy to acquire, distribute, use, monitor, analyze, and keep track of open source software to reduce the risk of vulnerable and buggy software and applications to an absolute minimum.

So, this white paper presented how to employ new strategies, tactics and tools to reduce their open source security risk.

White Paper main segments

This is the main segments of this white paper:

  • The challenges facing open source developers
  • List of a few questions to assess potential risk and liabilities.
  • Straightforward tactics that significantly reduce OSS risks:
 # Create OSS policies
 # Create an OSS acquisition process
 # Managing provisioning
 # Tracking usage
 # Ongoing monitoring and analysing


Conclusion

Open source software is here to stay but that doesn't mean that developers can use it without considering the vulnerabilities and security issues they may introduce into their development projects. The fact is, there’s no such thing as bulletproof, bug-free, automatically license compliant, and easily auditable software. Not in the open source world and not in the commercial off the shelf (COTS) world.

Full White Paper

Reduce your open source security risk: Strategies, tactics, and tools - by RogeWave company