Security-evaluated operating system: Difference between revisions

Content deleted Content added
Sperling (talk | contribs)
m See also: comparison of operating systems (security) has been merged
Kylras (talk | contribs)
Link suggestions feature: 3 links added.
 
(125 intermediate revisions by 76 users not shown)
Line 1:
{{Short description|Operating system that achieved security certification}}
Some [[operating system]]s have achieved a certification from an external security auditing organization, such as a B2 or A1 [[TCSEC|CSC-STD-001-83 "Department of Defense Trusted Computer System Evaluation Criteria"]] or [[Common Criteria]] certification.
{{external|date=April 2025}}
In [[computing]], '''security-evaluated operating systems''' have achieved certification from an external security-auditing organization, the most popular evaluations are [[Common Criteria]] (CC) and [[FIPS 140-2]].
 
== [[TrustedOracle Solaris]] ==
Note that meeting a given set of evaluation criteria does not make a computer operating system "secure".
Certificates are not endorsements of the "goodness" of an IT product by any organization that recognizes or gives effect to the certificate. A certificate represents the successful completion of a validation that product met CC requirements for which it was evaluated/tested.
 
[[Trusted Solaris]] 8 iswas a security-focused version of the [[Solaris Operating(operating Environmentsystem)|Solaris]] [[Unix]] operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, [[pluggable authentication]], mandatory [[access control]], additional physical authentication devices, and fine-grained access control(FGAC). Versions of Trusted Solaris through version 8 are [[Common Criteria]] certified.<ref>{{Cite Seeweb [|last=Fischer |first=PJ |date=30 March 2004 |title=CESG INFORMATION ASSURANCE AND CERTIFICATION SERVICES |url=http://wwwswww.sun.com/software/security/securitycert/trustedsolarisimages/TSol8_7-03CMS.html]jpg and|url-status=usurped [|archive-url=https://web.archive.org/web/20070312070621/http://wwwswww.sun.com/software/security/securitycert/images/TSol8_7-03CMS.jpg] |archive-date=12 March 2007}}</ref><ref>{{Cite web |date=2004-10-13 |title=Sun Common Criteria Certification |url=http://wwws.sun.com/software/security/securitycert/trustedsolaris.html |archive-url=https://web.archive.org/web/20041013000439/http://wwws.sun.com/software/security/securitycert/trustedsolaris.html |archive-date=13 October 2004 |access-date=2023-02-17 |website=Sun Microsystems}}</ref>
Note that certifications are given for a particular configuration of the system running on a certain set of hardware; the certificate is only valid for this specific configuation, and does not extend to the same software if any aspect of the installation is altered in any way. Often these scenarios are extremely limited compared to the normal environments in which computer operating systems are usually used.
 
Trusted Solaris Version 8 received the [[Evaluation_Assurance_LevelEvaluation Assurance Level|EAL]] 4 certification level augmented by a number of protection profiles. {{r|g=nb|r=See [https://web.archive.org/web/20040621163731/http://csrc.nist.gov/cc/Documents/CC%20v2.1%20-%20HTML/PART3/PART36.HTM 6 Evaluation assurance levels] for explanation of The Evaluation Assurance Levels.}}
Moreover, the field of operating systems which can apply to be evaluated is restricted to those with strong corporative backing, because of the costs that ensue. In general, you will find the most popular vendors listed here, while this does not mean that other solutions, such as [[OSS]] solutions, couldn't reach, or exceed this level of security under certain circumstances, without even having tried to pass this advocacy evaluation.
 
== [[BAE Systems' STOP]] ==
== [[Trusted Solaris]] ==
Trusted Solaris is a security-focused version of the [[Solaris Operating Environment|Solaris]] [[Unix]] operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, [[pluggable authentication]], mandatory [[access control]], additional physical authentication devices, and fine-grained access control. Versions of Trusted Solaris through version 8 are [[Common Criteria]] certified. See [http://wwws.sun.com/software/security/securitycert/trustedsolaris.html] and [http://wwws.sun.com/software/security/securitycert/images/TSol8_7-03CMS.jpg]
Trusted Solaris Version 8 received the [[Evaluation_Assurance_Level|EAL]]4 certification level augmented by a number of protection profiles. See [http://csrc.nist.gov/cc/Documents/CC%20v2.1%20-%20HTML/PART3/PART36.HTM] for explanation of The Evaluation Assurance Levels.
 
[[BAE Systems]]' [[XTS-400|STOP]] version 6.0.E received an [[Evaluation_Assurance_LevelEvaluation Assurance Level|EAL]]4+ in April 2004 and the 6.1.E version received an [[Evaluation_Assurance_LevelEvaluation Assurance Level|EAL]]5+ certification in March 2005. Previous versionsSTOP version 6.4 U4 received an EAL5+ certification in July 2008. Versions of STOP prior to STOP 6 have held a B3 certificationcertifications under [[TCSEC]]. While STOP 6 is binary compatible with Linux, it isdoes not derivedderive from the [[Linux kernel]]. See [httpfor an overview of the system.<ref>{{Cite web |url=https://www.digitalnetbaesystems.com/solutionsProductsServices/information_assurance/xts400_trusted_sysbae_prod_csit_xts400.htm]html for|access-date=2024-03-01 an overview of the system|website=www.baesystems.com}}</ref>
== [[BAE Systems' STOP]] ==
BAE Systems' STOP version 6.0.E received an [[Evaluation_Assurance_Level|EAL]]4+ in April 2004 and the 6.1.E version received an [[Evaluation_Assurance_Level|EAL]]5+ certification in March 2005. Previous versions of STOP have held a B3 certification under [[TCSEC]]. While STOP 6 is binary compatible with Linux, it is not derived from the Linux kernel. See [http://www.digitalnet.com/solutions/information_assurance/xts400_trusted_sys.htm] for an overview of the system.
 
== [[Red Hat Enterprise Linux 3]] ==
[[Red Hat Enterprise Linux]] Version 7.1 achieved [[Evaluation Assurance Level|EAL]]4+ in October 2016.<ref>{{Cite web|title=Red Hat Achieves Common Criteria Security Certification for Red Hat Enterprise Linux 7|url=https://www.redhat.com/en/about/press-releases/red-hat-achieves-common-criteria-security-certification-red-hat-enterprise-linux-7|access-date=2023-02-17|website=www.redhat.com|date=26 October 2016 |language=en}}</ref>
Red Hat Enterprise Linux 3 is a version of the [[GNU/Linux]] operating system. It was evaluated at [[Evaluation_Assurance_Level|EAL]]2 in February 2004. [http://niap.nist.gov/cc-scheme/vpl/vpl_vendor.html]
 
[[Red Hat Enterprise Linux]] Version 6.2 on 32 bit x86 Architecture achieved [[Evaluation Assurance Level|EAL]]4+ in December 2014.<ref>{{Cite report |url=https://www.commoncriteriaportal.org/files/epfiles/0924a_pdf.pdf |title=Certification Report BSI-DSZ-CC-0924-2014 for Red Hat Enterprise Linux on 32 bit x86 Architecture, Version 6.2 from Red Hat, Inc. |last=Weber |first=Joachim |date=28 May 2010 }}</ref>
== [[SUSE|Novell Suse Enterprise Linux Server 9]] ==
[[Red Hat Enterprise Linux]] Version 6.2 with KVM Virtualization for x86 Architectures achieved [[Evaluation Assurance Level|EAL]]4+ in October 2012.<ref>{{Cite report |url=https://www.commoncriteriaportal.org/files/epfiles/0754a_pdf.pdf |title=Cerfification Report BSI-DSZ-CC-0754-2012 for Red Hat Enterprise Linux, Version 6.2 with KVM Virtualization for x86 Architectures from Red Hat, Inc. |last=Kowalski |first=Bernd |date=23 October 2012 |publisher=Federal Office for Information Security}}</ref>
Novell's Suse Enterprise Linux Server 9 running on an IBM eServer was certified at CAPP/[[Evaluation_Assurance_Level|EAL]]4+ in February 2005. [http://www.heise.de/english/newsticker/news/56451 News release at heise.de]
 
[[Red Hat Enterprise Linux]] 5 achieved [[Evaluation Assurance Level|EAL]]4+ in June 2007.<ref>{{cite web |url=http://www.niap-ccevs.org/cc-scheme/st/?vid=10165 |url-status=dead |archive-url=https://web.archive.org/web/20071214060630/http://www.niap-ccevs.org/cc%2Dscheme/st/?vid=10165 |archive-date=2007-12-14 |title=CCEVS: Validated Product - Red Hat Enterprise Linux Version 5}}</ref><ref>{{cite web |url=http://www.niap-ccevs.org/cc-scheme/st/index.cfm/vid/10125 |title = NIAP}}</ref>
== [[Windows 2000]] ==
 
One configration of Microsoft's Windows 2000 operating system with Service Pack 3 has been certified at CAPP/EAL4.
==Novell [[SUSE|Novell SuseLinux Enterprise Linux Server 9]] ==
Note that this configuration had all networking disabled.
Novell's [[SUSE Linux Enterprise Server]] 15 is certified for IBM Z, Arm and x86-64 at CAPP/[[Evaluation Assurance Level|EAL]]4+ in August 2021. See.<ref>{{Cite web |title=SUSE Linux Enterprise Earns Common Criteria EAL 4+,... |url=https://www.suse.com/news/SUSE-Linux-Enterprise-Earns-Common-Criteria-Certification/ |access-date=2024-03-01 |website=www.suse.com |language=en}}</ref>
 
Novell's Suse Enterprise[[SUSE Linux Enterprise Server]] 9 running on an IBM eServer was certified at CAPP/[[Evaluation_Assurance_LevelEvaluation Assurance Level|EAL]]4+ in February 2005. See [https://web.archive.org/web/20050221071252/http://www.heise.de/english/newsticker/news/56451 News release at heise.de].
 
==Microsoft Windows==
The following versions of [[Microsoft Windows]] have received EAL 4 Augmented ALC_FLR.3 certification:
 
* [[Windows 2008]] Server (64-bit), Enterprise (64-bit) and Datacenter, as well as [[Windows Vista]] Enterprise (both 32-bit and 64-bit) attained EAL 4 Augmented (colloquially referred to as EAL 4+) ALC_FLR.3 status in [http://www.commoncriteriaportal.org/files/epfiles/st_vid10291-st.pdf 2009].
* [[Windows 2000]] Server, Advanced Server, and Professional, each with Service Pack 3 and Q326886 Hotfix operating on the x86 platform were certified as [https://web.archive.org/web/20041211111405/http://niap.nist.gov/cc-scheme/st/ST_VID4002-VR.pdf CAPP/EAL 4 Augmented ALC_FLR.3] in October 2002. (This includes standard configurations as Domain Controller, Server in a Domain, Stand-alone Server, Workstation in a Domain, Stand-alone Workstation)
* [[Windows XP]] Professional and Embedded editions, with Service Pack 2, and [[Windows Server 2003]] Standard and Enterprise editions (32-bit and 64-bit), with Service Pack 1, were all [http://www.microsoft.com/presspass/press/2005/dec05/12-14CommonCriteriaPR.mspx certified] in December 2005.
 
==SeeMac alsoOS X==
 
Apple's [[Mac OS X]] and Mac OS X Server running 10.3.6 both with the Common Criteria Tools Package installed were certified at CAPP/[[Evaluation Assurance Level|EAL]]3 in January 2005. [https://web.archive.org/web/20060715032340/http://niap.nist.gov/cc-scheme/vpl/vpl_type.html#operatingsystem]
 
Apple's Mac OS X & Mac OS X Server running the latest version 10.4.6 have not yet been fully evaluated however the Common Criteria Tools package is available.<ref>{{cite web |url=https://www.apple.com/support/downloads/commoncriteriatoolsfor104.html |title=Apple - Support - Downloads - Common Criteria Tools for 10.4 |website=www.apple.com |url-status=dead |archive-url=https://web.archive.org/web/20050503222757/http://www.apple.com/support/downloads/commoncriteriatoolsfor104.html |archive-date=2005-05-03}}</ref>
 
== GEMSOS ==
Some{{which|date=April 2025}} versions of Gemini [[Multiprocessing]] Secure Operating System <ref>[http://www.aesec.com/]</ref>{{primary source inline|date=April 2025}} were qualified as a [[Trusted Computer System Evaluation Criteria|TCSEC]] A1 system. GEMSOS runs on [[IA-32|x86]] processor type [[Commercial off-the-shelf|COTS]] hardware.
 
== OpenVMS and SEVMS ==
The SEVMS <ref>{{cite web|url= http://h71000.www7.hp.com/openvms/products/sevms/|title=Security Enhanced VMS (SEVMS) |archive-url= https://web.archive.org/web/20151119105617/http://h71000.www7.hp.com/openvms/products/sevms/|archive-date=2015-11-19|website=Hewlett Packard}}</ref> enhancement to [[OpenVMS|VMS]] was a CC B1/B3<ref>{{Cite web |url=http://www.decus.de/slides/sy2000/Vortraege_2803/1M01.PDF |title=OpenVMS security presentation |access-date=2006-06-16 |archive-date=2007-10-24 |archive-url=https://web.archive.org/web/20071024112653/http://www.decus.de/slides/sy2000/Vortraege_2803/1M01.PDF |url-status=dead }}</ref> system formerly of [[Digital Equipment Corporation]] (DEC). A standard OpenVMS installation is rated as CC C2.<ref>National Computer Security Center (NCSC) Trusted Product Evaluation List (TPEL)</ref>
 
== Green Hills INTEGRITY-178B ==
 
[[Green Hills Software]]'s INTEGRITY-178B real-time operating system was certified at Common Criteria [[Evaluated Assurance Level|EAL]]6+ in September 2008, [http://www.niap-ccevs.org/st/vid10119/] running on an embedded PowerPC processor on a Compact PCI card.
 
== Unisys MCP ==
 
The [[Burroughs MCP|Unisys MCP]] operating system includes an implementation of the DoD [[Trusted Computer System Evaluation Criteria|Orange Book]] [[Trusted Computer System Evaluation Criteria#C — Discretionary protection|C2 specification]], the controlled access protection sub-level of discretionary protection.<ref name="orangebook" /> MCP/AS obtained the C2 rating in August, 1987.<ref>{{cite book|publisher= National Computer Security Center|date=September 27, 1989|title= Final Evaluation Report of Unisys Corporation A Series MCP/AS Release 3.7 (CSC-EPL-87/003, Library No. S228,515)|___location=Fort George G. Meade, MD|url= http://apps.dtic.mil/dtic/tr/fulltext/u2/a208007.pdf|archive-url= https://web.archive.org/web/20160304060308/http://www.dtic.mil/dtic/tr/fulltext/u2/a208007.pdf|url-status= live|archive-date= March 4, 2016}}</ref>
 
== Unisys OS 2200 ==
 
The [[OS 2200|Unisys OS 2200]] operating system includes an implementation of the DoD [[Trusted Computer System Evaluation Criteria|Orange Book]] [[Trusted Computer System Evaluation Criteria#B .E2.80.94 Mandatory protection|B1, Labeled security protection]] level specification.<ref name="orangebook">{{cite book|publisher=National Security Institute|year=1985|title=Department of Defense Trusted Computer System Evaluation Criteria (NSI 5200.28-STD)|url=http://nsi.org/Library/Compsec/orangebo.txt|access-date=2015-06-03|archive-date=2009-06-25|archive-url=https://web.archive.org/web/20090625195703/http://nsi.org/Library/Compsec/orangebo.txt|url-status=dead}}</ref> OS 2200 first obtained a successful B1 evaluation in September, 1989.<ref>{{cite book|publisher= National Computer Security Center|date=September 27, 1989|title= Final Evaluation Report of Unisys Corporation OS 1100 (CSC-EPL-89/004, Library No. S33,122)|___location=Fort George G. Meade, MD|url= http://apps.dtic.mil/dtic/tr/fulltext/u2/a234058.pdf|archive-url= https://web.archive.org/web/20170224183457/http://www.dtic.mil/dtic/tr/fulltext/u2/a234058.pdf|url-status= live|archive-date= February 24, 2017}}</ref>
Unisys maintained that evaluation until 1994 through the National Computer Security Center Rating Maintenance Phase (RAMP) of the Trusted Product Evaluation Program.<ref>{{cite book|publisher= National Computer Security Center|date=July 26, 1994|title= Final Evaluation Report Unisys Corporation OS 1100/2200 (CSC-EPL-76/999, Library No. S225,nnn)|___location=Fort George G. Meade, MD}}</ref><ref>{{cite book|publisher= National Computer Security Center|date= 23 June 1989|title= Rating Maintenance Phase Program Document (NCSC-TG-013-89, Library No. S-232,468)|___location= Fort George G. Meade, MD|url= http://securityv.isu.edu/isl/ncsctg13.html|access-date= 3 June 2015|archive-date= 5 March 2016|archive-url= https://web.archive.org/web/20160305072750/http://securityv.isu.edu/isl/ncsctg13.html|url-status= dead}}</ref>
 
== See also ==
 
==See also==
* [[Security focused operating system]]
* [[Comparison of operating systems]]
* [[Security -focused operating system]]
* [http://niap.nist.gov/cc-scheme/vpl/vpl_type.html NIST published list of CC Evaluated Products]
* [[Trusted operating system]]
 
==Notes==
{{reflist|group = nb}}
 
== External links ==
 
* The [https://www.commoncriteriaportal.org/products/ common criteria portal's products list] has an "Operating Systems" category containing CC certification results
 
== References ==
{{reflist}}
 
[[Category:Operating systemssystem security]]
[[Category:Computer security procedures]]