Security-evaluated operating system

In computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2.

Oracle Solaris

Trusted Solaris 8 was a security-focused version of the Solaris Unix operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, pluggable authentication, mandatory access control, additional physical authentication devices, and fine-grained access control(FGAC). Versions of Trusted Solaris through version 8 are Common Criteria certified. See and Trusted Solaris Version 8 received the EAL4 certification level augmented by a number of protection profiles. See for explanation of The Evaluation Assurance Levels.

BAE Systems' STOP

BAE Systems' STOP version 6.0.E received an EAL4+ in April 2004 and the 6.1.E version received an EAL5+ certification in March 2005. STOP version 6.4 U4 received an EAL5+ certification in July 2008. Versions of STOP prior to STOP 6 have held B3 certifications under TCSEC. While STOP 6 is binary compatible with Linux, it does not derive from the Linux kernel. See for an overview of the system.

Red Hat Enterprise Linux 5

Red Hat Enterprise Linux 5 achieved EAL4+ in June 2007.[1][2]

Red Hat Enterprise Linux 6

Red Hat Enterprise Linux Version 6.2 on 32 bit x86 Architecture achieved EAL4+ in December 2014.[3] Red Hat Enterprise Linux Version 6.2 with KVM Virtualization for x86 Architectures achieved EAL4+ in October 2012.[4]

Novell SUSE Linux Enterprise Server

Novell's SUSE Linux Enterprise Server 9 running on an IBM eServer was certified at CAPP/EAL4+ in February 2005. See News release at heise.de

Microsoft Windows

The following versions of Microsoft Windows have received EAL 4 Augmented ALC_FLR.3 certification:

Mac OS X

Apple's Mac OS X and Mac OS X Server running 10.3.6 both with the Common Criteria Tools Package installed were certified at CAPP/EAL3 in January 2005.

Apple's Mac OS X & Mac OS X Server running the latest version 10.4.6 have not yet been fully evaluated however the Common Criteria Tools package is available.[5]

GEMSOS

Gemini Multiprocessing Secure Operating System is a TCSEC A1 system that runs on x86 processor type COTS hardware.

HP OpenVMS and SEVMS

The SEVMS [6] enhancement to VMS is a CC B1/B3[7] system formerly of Digital Equipment Corporation (DEC) later Compaq, now Hewlett-Packard (HP).[8]

Green Hills INTEGRITY-178B

Green Hills Software's INTEGRITY-178B real-time operating system was certified at Common Criteria EAL6+ in September 2008. running on an embedded PowerPC processor on a Compact PCI card.

Unisys MCP

The Unisys MCP operating system includes an implementation of the DoD Orange Book C2 specification, the controlled access protection sub-level of discretionary protection.[9] MCP/AS obtained the C2 rating in August, 1987.[10]

Unisys OS 2200

The Unisys OS 2200 operating system includes an implementation of the DoD Orange Book B1, Labeled security protection level specification.[9] OS 2200 first obtained a successful B1 evaluation in September, 1989.[11] Unisys maintained that evaluation until 1994 through the National Computer Security Center Rating Maintenance Phase (RAMP) of the Trusted Product Evaluation Program.[12][13]

See also

References

  1. http://www.niap-ccevs.org/cc-scheme/st/?vid=10165
  2. http://www.niap-ccevs.org/cc-scheme/st/index.cfm/vid/10125
  3. https://www.commoncriteriaportal.org/files/epfiles/0924a_pdf.pdf
  4. https://www.commoncriteriaportal.org/files/epfiles/0754a_pdf.pdf
  5. http://www.apple.com/support/downloads/commoncriteriatoolsfor104.html
  6. http://h71000.www7.hp.com/openvms/products/sevms/
  7. OpenVMS security presentation
  8. http://citeseer.ist.psu.edu/428108.html
  9. 1 2 Department of Defense Trusted Computer System Evaluation Criteria (NSI 5200.28-STD). National Security Institute. 1985.
  10. Final Evaluation Report of Unisys Corporation A Series MCP/AS Release 3.7 (CSC-EPL-87/003, Library No. S228,515) (PDF). 9800 Savage Road, Fort George G. Meade, Maryland 20755-6000: National Computer Security Center. September 27, 1989.
  11. Final Evaluation Report of Unisys Corporation OS 1100 (CSC-EPL-89/004, Library No. S33,122) (PDF). 9800 Savage Road, Fort George G. Meade, Maryland 20755-6000: National Computer Security Center. September 27, 1989.
  12. Final Evaluation Report Unisys Corporation OS 1100/2200 (CSC-EPL-76/999, Library No. S225,nnn). 9800 Savage Road, Fort George G. Meade, Maryland 20755-6000: National Computer Security Center. July 26, 1994.
  13. Rating Maintenance Phase Program Document (NCSC-TG-013-89, Library No. S-232,468). 9800 Savage Road, Fort George G. Meade, Maryland 20755-6000: National Computer Security Center. 23 June 1989.
This article is issued from Wikipedia - version of the Thursday, March 10, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.