Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. Article

Canonical
on 10 January 2014

Ubuntu scores highest in UK Gov security assessment


UK government security arm CESG has published a report of its assessment on the security of all ‘End User Device’ operating systems.

Its assessment compared 11 desktop and mobile operating systems across 12 categories including: VPN, disk encryption, and authentication. These criteria are roughly equivalent to a standard set of enterprise security best practices, and Ubuntu 12.04 LTS came out on top – the only operating system that passed nine requirements without any “Significant Risks”.

This article summarises the report, addressing the specific remarks raised in the assessment, and examines why Ubuntu is such a secure OS for government and enterprise use. UK Gov Report Summary

Related posts


Ishani Ghoshal
11 September 2025

What our users make with Ubuntu Pro – Episode 2

Ubuntu Article

How Vaultara achieved FedRAMP compliance with Ubuntu Pro Ubuntu Pro helps businesses worldwide to innovate and shape the future. In this edition of What our users make with Pro, we talk to Dave Monk, CTO of Vaultara, a FedRAMP approved data-sharing platform trusted by the US government. Dave shares how Ubuntu Pro became a cornerstone ...


Isobel Kate Maxwell
10 September 2025

What’s the state of open source adoption in Europe?

Ubuntu Article

New research suggests 86% of European organizations believe open source is valuable for the future of their industry – but only 34% have a clear and visible open source strategy  The Linux Foundation’s latest report, Open source as Europe’s strategic advantage: trends, barriers, and priorities for the European open source community amid r ...


Matthew de Klerk
10 September 2025

What are dependencies, and how do you secure them?

Security Article

There are thousands of free-to-use, ready-built programs and code repositories that solve  problems you’d otherwise need to spend weeks building the solutions for from scratch. However, like with all software, you still need to ensure that your software supply chain is secure and safe to consume. ...