After the recent findings of a back door in Dual_EC surreptitiously included in Juniper's product, I was curious if Sophos has planned any audits for unauthorized code.
Unlike Juniper, which is a closed code system, UTM is 99% based on open source code, so it is constantly audited and reviewed by the open source community.
Its somewhat of a fallacy to assume that open source projects are being reviewed and audited. It really depends on the governance of each organization/project/component. We cannot assume that an open source project is free of critical defects because its open source; one only has to be reminded of the Heartbleed and Shellshock defects.
Many companies just use open source to offset development costs. They often take no further measures to attest the authenticity of binaries from open source projects, nor do they take responsibility to verify whether the open source projects is actually safe. I'm not saying Sophos falls under this category, but it isn't exactly forthcoming about its procedures and policies when dealing with open source projects.
So the question remains. What processes and policies does Sophos employ to review the code?
I really don't expect this to be answered, since silence is part of operations security.
Its somewhat of a fallacy to assume that open source projects are being reviewed and audited. It really depends on the governance of each organization/project/component. We cannot assume that an open source project is free of critical defects because its open source; one only has to be reminded of the Heartbleed and Shellshock defects.
Many companies just use open source to offset development costs. They often take no further measures to attest the authenticity of binaries from open source projects, nor do they take responsibility to verify whether the open source projects is actually safe. I'm not saying Sophos falls under this category, but it isn't exactly forthcoming about its procedures and policies when dealing with open source projects.
So the question remains. What processes and policies does Sophos employ to review the code?
I really don't expect this to be answered, since silence is part of operations security.