Skip to main content
  1. Blog
  2. Article

cmoullec
on 24 April 2020


An independent evaluation of Ubuntu Core’s security capabilities

Manufacturers of Internet of Things (IoT) devices require an embedded operating system that is feature-rich, scalable, and — most importantly — secure. Built from the ground-up to meet these requirements, Ubuntu Core represents a comprehensive ecosystem for large-scale IoT deployments that solves many of the security challenges associated with traditional Linux distribution models — while also empowering developers with unprecedented flexibility and control.

This whitepaper from global cybersecurity experts, Rule4, provides an independent, third-party evaluation of Ubuntu Core’s security capabilities. Following a data-driven approach, all aspects received extensive testing to validate the strengths of its cybersecurity controls.

Read the report to learn about:

  • The features and design tenets — such as application sandboxing — that make Ubuntu Core inherently secure out-of-the-box
  • The case for adopting Ubuntu Core for IoT devices in light of this testing
  • Rule4’s evaluation methodology and a summary of its results, which included no critical findings

Download report

Related posts


Florencia Cabral Berenfus
17 December 2025

Extending ROS Noetic Support with ESM-Enabled Content Snaps

Robotics Article

Canonical has now extended its ESM (Expanded Security Maintenance) for ROS coverage to ROS Noetic content-sharing snaps. With ESM for ROS now available in both deb and snap formats, Ubuntu continues to be the trusted foundation for secure, long-term robotics innovation. ...


Canonical
10 March 2026

Fast-tracking industrial and AI deployment on Renesas RZ platforms 

Canonical announcements Article

Certified Ubuntu 24.04 LTS images now available Canonical is pleased to announce the general availability (GA) of certified Ubuntu 24.04 LTS and Ubuntu Core 24 images for the Renesas RZ/G2L and RZ/G2LC 64-bit microprocessors (MPUs) platforms. With a production-ready Ubuntu version, users can benefit from enterprise-grade security, long-te ...


ijlal-loutfi
6 March 2026

Sovereign clouds: enhanced data security with confidential computing 

Confidential computing Article

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences betwe ...