Content deleted Content added
→Oracle Solaris: refs |
Link suggestions feature: 3 links added. |
||
(21 intermediate revisions by 14 users not shown) | |||
Line 1:
{{Short description|Operating system that achieved security certification}}
{{external|date=April 2025}}
In [[computing]], '''security-evaluated operating systems''' have achieved certification from an external security-auditing organization, the most popular evaluations are [[Common Criteria]] (CC) and [[FIPS 140-2]].
==Oracle Solaris==
[[Trusted Solaris]] 8 was a security-focused version of the [[Solaris (operating system)|Solaris]] [[Unix]] operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, [[pluggable authentication]], mandatory [[access control]], additional physical authentication devices, and fine-grained access control(FGAC). Versions of Trusted Solaris through version 8 are [[Common Criteria]] certified.<ref>{{Cite
Trusted Solaris Version 8 received the [[Evaluation Assurance Level|EAL]] 4 certification level augmented by a number of protection profiles. {{r|g=nb|r=See [https://web.archive.org/web/20040621163731/http://csrc.nist.gov/cc/Documents/CC%20v2.1%20-%20HTML/PART3/PART36.HTM 6 Evaluation assurance levels] for explanation of The Evaluation Assurance Levels.}}
==BAE Systems' STOP==
[[BAE Systems]]' [[XTS-400|STOP]] version 6.0.E received an [[Evaluation Assurance Level|EAL]]4+ in April 2004 and the 6.1.E version received an [[Evaluation Assurance Level|EAL]]5+ certification in March 2005. STOP version 6.4 U4 received an EAL5+ certification in July 2008. Versions of STOP prior to STOP 6 have held B3 certifications under [[TCSEC]]. While STOP 6 is binary compatible with Linux, it does not derive from the [[Linux kernel]]. See
==Red Hat Enterprise Linux==
[[Red Hat Enterprise Linux]] Version 7.1 achieved [[Evaluation Assurance Level|EAL]]4+ in October 2016.<ref>{{Cite web|title=Red Hat Achieves Common Criteria Security Certification for Red Hat Enterprise Linux 7|url=https://www.redhat.com/en/about/press-releases/red-hat-achieves-common-criteria-security-certification-red-hat-enterprise-linux-7|access-date=2023-02-17|website=www.redhat.com|date=26 October 2016 |language=en}}</ref>
[[Red Hat Enterprise Linux]] Version 6.2 on 32 bit x86 Architecture achieved [[Evaluation Assurance Level|EAL]]4+ in December 2014.<ref>{{Cite report |url=https://www.commoncriteriaportal.org/files/epfiles/0924a_pdf.pdf |title=Certification Report BSI-DSZ-CC-0924-2014 for Red Hat Enterprise Linux on 32 bit x86 Architecture, Version 6.2 from Red Hat, Inc. |last=Weber |first=Joachim |date=28 May 2010
[[Red Hat Enterprise Linux]] Version 6.2 with KVM Virtualization for x86 Architectures achieved [[Evaluation Assurance Level|EAL]]4+ in October 2012.<ref>{{Cite report |url=https://www.commoncriteriaportal.org/files/epfiles/0754a_pdf.pdf
[[Red Hat Enterprise Linux]] 5 achieved [[Evaluation Assurance Level|EAL]]4+ in June 2007.<ref>{{cite web |url=http://www.niap-ccevs.org/cc-scheme/st/?vid=10165 |url-status=dead |archive-url=https://web.archive.org/web/20071214060630/http://www.niap-ccevs.org/cc%2Dscheme/st/?vid=10165 |archive-date=2007-12-14 |title=CCEVS: Validated Product - Red Hat Enterprise Linux Version 5}}</ref><ref>{{cite web |url=http://www.niap-ccevs.org/cc-scheme/st/index.cfm/vid/10125 |title = NIAP}}</ref>
==Novell SUSE Linux Enterprise Server==
Novell's [[SUSE Linux Enterprise Server]] 15 is certified for IBM Z, Arm and x86-64 at CAPP/[[Evaluation Assurance Level|EAL]]4+ in August 2021. See.<ref>{{Cite web |title=SUSE Linux Enterprise Earns Common Criteria EAL 4+,...
Novell's [[SUSE Linux Enterprise Server]] 9 running on an IBM eServer was certified at CAPP/[[Evaluation Assurance Level|EAL]]4+ in February 2005. See [https://web.archive.org/web/20050221071252/http://www.heise.de/english/newsticker/news/56451 News release at heise.de].
==Microsoft Windows==
The following versions of [[Microsoft Windows]] have received EAL 4 Augmented ALC_FLR.3 certification:
* [[Windows 2008]] Server (64-bit), Enterprise (64-bit) and Datacenter, as well as [[Windows Vista]] Enterprise (both 32-bit and 64-bit) attained EAL 4 Augmented (colloquially referred to as EAL 4+) ALC_FLR.3 status in [http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf 2009].
* [[Windows 2000]] Server, Advanced Server, and Professional, each with Service Pack 3 and Q326886 Hotfix operating on the x86 platform were certified as [https://web.archive.org/web/20041211111405/http://niap.nist.gov/cc-scheme/st/ST_VID4002-VR.pdf CAPP/EAL 4 Augmented ALC_FLR.3] in October 2002. (This includes standard configurations as Domain Controller, Server in a Domain, Stand-alone Server, Workstation in a Domain, Stand-alone Workstation)
* [[Windows XP]] Professional and Embedded editions, with Service Pack 2, and [[Windows Server 2003]] Standard and Enterprise editions (32-bit and 64-bit), with Service Pack 1, were all [http://www.microsoft.com/presspass/press/2005/dec05/12-14CommonCriteriaPR.mspx certified] in December 2005.
Line 36 ⟶ 37:
Apple's [[Mac OS X]] and Mac OS X Server running 10.3.6 both with the Common Criteria Tools Package installed were certified at CAPP/[[Evaluation Assurance Level|EAL]]3 in January 2005. [https://web.archive.org/web/20060715032340/http://niap.nist.gov/cc-scheme/vpl/vpl_type.html#operatingsystem]
Apple's Mac OS X & Mac OS X Server running the latest version 10.4.6 have not yet been fully evaluated however the Common Criteria Tools package is available.<ref>{{cite web |url=https://www.apple.com/support/downloads/commoncriteriatoolsfor104.html |title=Apple - Support - Downloads - Common Criteria Tools for 10.4 |website=www.apple.com |url-status=dead |archive-url=https://web.archive.org/web/20050503222757/http://www.apple.com/support/downloads/commoncriteriatoolsfor104.html |archive-date=2005-05-03}}
== GEMSOS ==
Some{{which|date=April 2025}} versions of Gemini [[Multiprocessing]] Secure Operating System <ref>[http://www.aesec.com/]</ref>{{primary
▲Gemini Multiprocessing Secure Operating System [http://www.aesec.com/] is a [[Trusted Computer System Evaluation Criteria|TCSEC]] A1 system that runs on [[IA-32|x86]] processor type [[Commercial off-the-shelf|COTS]] hardware.
== OpenVMS and SEVMS ==
The SEVMS <ref>{{cite web|url= http://h71000.www7.hp.com/openvms/products/sevms/|title=Security Enhanced VMS (SEVMS) |archive-url= https://web.archive.org/web/20151119105617/http://h71000.www7.hp.com/openvms/products/sevms/|archive-date=2015-11-19|website=Hewlett Packard}}</ref> enhancement to [[OpenVMS|VMS]] was a CC B1/B3<ref>
== Green Hills INTEGRITY-178B ==
[[Green Hills Software]]'s INTEGRITY-178B real-time operating system was certified at Common Criteria [[Evaluated Assurance Level|EAL]]6+ in September 2008
== Unisys MCP ==
Line 55:
== Unisys OS 2200 ==
The [[OS 2200|Unisys OS 2200]] operating system includes an implementation of the DoD [[Trusted Computer System Evaluation Criteria|Orange Book]] [[Trusted Computer System Evaluation Criteria#B .E2.80.94 Mandatory protection|B1, Labeled security protection]] level specification.<ref name="orangebook">{{cite book|publisher=National Security Institute|year=1985|title=Department of Defense Trusted Computer System Evaluation Criteria (NSI 5200.28-STD)|url=http://nsi.org/Library/Compsec/orangebo.txt|access-date=2015-06-03|archive-date=2009-06-25|archive-url=https://web.archive.org/web/20090625195703/http://nsi.org/Library/Compsec/orangebo.txt|url-status=dead}}</ref> OS 2200 first obtained a successful B1 evaluation in September, 1989.<ref>{{cite book|publisher= National Computer Security Center|date=September 27, 1989|title= Final Evaluation Report of Unisys Corporation OS 1100 (CSC-EPL-89/004, Library No. S33,122)|___location=Fort George G. Meade, MD|url= http://apps.dtic.mil/dtic/tr/fulltext/u2/a234058.pdf|archive-url= https://web.archive.org/web/20170224183457/http://www.dtic.mil/dtic/tr/fulltext/u2/a234058.pdf|url-status= live|archive-date= February 24, 2017}}</ref>
Unisys maintained that evaluation until 1994 through the National Computer Security Center Rating Maintenance Phase (RAMP) of the Trusted Product Evaluation Program.<ref>{{cite book|publisher= National Computer Security Center|date=July 26, 1994|title= Final Evaluation Report Unisys Corporation OS 1100/2200 (CSC-EPL-76/999, Library No. S225,nnn)|___location=Fort George G. Meade, MD}}</ref><ref>{{cite book|publisher= National Computer Security Center|date= 23 June 1989|title= Rating Maintenance Phase Program Document (NCSC-TG-013-89, Library No. S-232,468)|___location= Fort George G. Meade, MD|url= http://securityv.isu.edu/isl/ncsctg13.html|access-date= 3 June 2015|archive-date= 5 March 2016|archive-url= https://web.archive.org/web/20160305072750/http://securityv.isu.edu/isl/ncsctg13.html|url-status= dead}}</ref>
== See also ==
Line 63:
* [[Security-focused operating system]]
* [[Trusted operating system]]
==Notes==
{{reflist|group = nb}}
== External links ==
|