Jump to content

Secure operating system

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Matt Crypto (talk | contribs) at 12:29, 28 May 2004 (we don't need a section on Solaris; all that info is in the Solaris article). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

This article is for operating systems which have achieved some credible form of security auditing, such as a B2 or A1 CSC-STD-001-83 "Department of Defense Trusted Computer System Evaluation Criteria" or Common Criteria certification.

For Security focused operating systems which do not necessarily have a certification, but which are aimed at security, see the appropriate article.

Trusted Solaris is a security-focused version of the Solaris Unix operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, pluggable authentication, mandatory access control, additional physical authentication devices, and fine-grained access control. Versions of Trusted Solaris through version 8 are Common Criteria certified.

See also