Skip to main content
  1. Blog
  2. Article

Canonical
on 10 January 2014

Ubuntu scores highest in UK Gov security assessment


UK government security arm CESG has published a report of its assessment on the security of all ‘End User Device’ operating systems.

Its assessment compared 11 desktop and mobile operating systems across 12 categories including: VPN, disk encryption, and authentication. These criteria are roughly equivalent to a standard set of enterprise security best practices, and Ubuntu 12.04 LTS came out on top – the only operating system that passed nine requirements without any “Significant Risks”.

This article summarises the report, addressing the specific remarks raised in the assessment, and examines why Ubuntu is such a secure OS for government and enterprise use. UK Gov Report Summary

Related posts


ijlal-loutfi
6 March 2026

Sovereign clouds: enhanced data security with confidential computing 

Confidential computing Article

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences betwe ...


Massimiliano Gori
2 March 2026

Supporting more identity providers on Ubuntu with the new Authd OIDC broker

Cloud and server Article

Today we are announcing the general availability of the new generic OpenID Connect (OIDC) broker for Authd. With enterprises needing to centralise access management controls, the ability to choose your own identity solution is paramount. This new broker snap is our answer to that need, allowing Ubuntu Desktop and Server to integrate with ...


Bertrand Boisseau
2 March 2026

Cloud-native Android™ infotainment: your CI pipeline shouldn’t depend on hardware

Automotive Article

More and more often, infotainment systems are being developed and delivered like software, yet often they are still tested and validated using hardware-centric processes. This is far from ideal: access to devices is limited, environments are difficult to reproduce, and iteration slows down as soon as multiple teams need to work in paralle ...