Monday 4 October 2021

Google is offering $1 million to secure open source software

Google has pledged $1 million in funding to the Linux Foundation’s Secure Open Source (SOS) pilot program, which aims to improve the security of critical open source projects.

The program is part of the tech giant's recently announced $10 billion commitment to cybersecurity defense, following a meeting with US President Joe Biden, in August.

According to a FAQ posted on the website of the SOS Rewards program, while it does appear similar to a traditional bug bounty program, the SOS Rewards program has a broader perspective and isn’t looking to reward specific project vulnerabilities.

“SOS rewards a very broad range of improvements that proactively harden critical open source projects and supporting infrastructure against application and supply chain attacks,” further explain members of the Google Open Source Security Team.

Securing the supply chain

The backing for the project comes after it emerged that there’s been a whopping 650% year over year increase in supply chain attacks targeted towards upstream open source public repositories.

The report noted that open source software continues to play an integral part of many critical infrastructure, which also makes it a ripe target for software supply chain attacks.

A few weeks back, Google revealed its financial backing for the Open Source Technology Improvement Fund (OSTIF), to sponsor in-depth security reviews to critical projects vital to the open source ecosystem, as part of OSTIF’s Managed Audit Program (MAP). 

This $1 million commitment to the SOS initiative further expands Google’s commitment to helping secure open source software.

According to the program, rewards range from $505 to $10,000 or more depending on the  scope and impact of the improvements on the larger community.

"We are starting with a $1 million investment and plan to expand the scope of the program based on community feedback," assures the Google Open Source Security Team.  

Via ZDNet

https://ift.tt/2YsgwRz

No comments:

Post a Comment