This is a list of operating systems specifically focused on security. Operating systems for general-purpose usage may be secure without having a specific focus on security.[1]

Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

Android-based

Debian-based

Xen-based

Gentoo-based

Other Linux distributions

BSD-based

SELinux module

Security-Enhanced Linux (SELinux) is a module that may be incorporated into a Linux distribution. SELinux gives administrators more control over access of the system. SELinux has been integrated with the Linux kernel by default since 2003.[16]

Object-capability systems

This section needs expansion. You can help by adding to it. (January 2018)

These operating systems are all engineered around the object-capabilities security paradigm. Instead of the system deciding if an access request should be granted, the bundling authority and designation decides.

Solaris-based

See also

References

  1. ^ "Mandatory Security - an overview | ScienceDirect Topics". www.sciencedirect.com. Retrieved 5 December 2021.
  2. ^ Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]". lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017.
  3. ^ "Whonix/Whonix". GitHub. Archived from the original on 25 November 2016. Retrieved 9 April 2018.
  4. ^ "Whonix: An OS for the era of Anonymous and Wikileaks". computerworld.com.au. Archived from the original on 7 November 2017. Retrieved 9 April 2018.
  5. ^ "Multiple Whonix-Workstation ™". www.whonix.org. Archived from the original on 1 October 2019. Retrieved 1 October 2019.
  6. ^ "Whonix: An Operating System Where IP & DNS Leaks Are Impossible".
  7. ^ Porup, J.M. (14 February 2022). "Qubes OS: A reasonably secure operating system". Qubes OS. Archived from the original on 14 February 2022.
  8. ^ Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint.
  9. ^ KITE Introduces a New Secured FOSS Based Operating System
  10. ^ A Look at Pentoo Linux and Its Security Analysis Tools, eWeek
  11. ^ 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
  12. ^ "Tin Hat". D'Youville College. Archived from the original on 3 March 2016. Retrieved 4 September 2015.
  13. ^ "Annvix: A stable, secure, no-frills server distro". Linux.com | The source for Linux information. 16 January 2008. Archived from the original on 24 July 2018. Retrieved 24 July 2018.
  14. ^ "Fedora Silverblue User Guide :: Fedora Docs". docs.fedoraproject.org. Archived from the original on 11 October 2021. Retrieved 11 October 2021.
  15. ^ "Pledge() - A New Mitigation Mechanism". Retrieved 8 October 2018.
  16. ^ "What is SELinux?". www.redhat.com. Retrieved 31 January 2023.
  17. ^ "Sun Common Criteria Certification". 13 October 2004. Archived from the original on 13 October 2004. Retrieved 9 April 2018.
  18. ^ "CESG Information Assurance and Certification Services". sun.com (JPG). 30 March 2004. Archived from the original on 12 March 2007.
  19. ^ "Sun Patch: Trusted Solaris 8 4/01: in.telnet patch". 4 October 2002. Retrieved 13 August 2012. 4734086 in.telnetd vulnerable to buffer overflow ?? (Solaris bug 4483514)[permanent dead link]