Security-evaluated operating system: Difference between revisions

Content deleted Content added
Add SLES 9 to list
No edit summary
Line 5:
 
Note that certifications are given for a particular configuration of the system running on a certain set of hardware; the certificate is only valid for this specific configuation, and does not extend to the same software if any aspect of the installation is altered in any way. Often these scenarios are extremely limited compared to the normal environments in which computer operating systems are usually used.
 
Moreover, the field of operating systems which can apply to be evaluated is restricted to those with strong corporative backing, because of the costs that ensue. In general, you will find the most popular vendors listed here, while this does not mean that other solutions, such as [[OSS]] solutions, could reach, or exceed this level of security under certain circumstances, without even having tried to pass this advocacy evaluation.
 
== [[Trusted Solaris]] ==