Security-evaluated operating system

From Wikipedia, the free encyclopedia

A security-evaluated operating system is an operating system that has achieved a certification from an external security auditing organization, such as a B2 or A1 CSC-STD-001-83 "Department of Defense Trusted Computer System Evaluation Criteria" or Common Criteria certification.

Note that meeting a given set of evaluation criteria does not make a computer operating system "secure". Certificates are not endorsements of the "goodness" of an IT product by any organization that recognizes or gives effect to the certificate. A certificate represents the successful completion of a validation that product met CC requirements for which it was evaluated/tested.

Note that certifications are given for a particular configuration of the system running on a certain set of hardware; the certificate is only valid for this specific configuration, and does not extend to the same software if any aspect of the installation is altered in any way. Often these scenarios are extremely limited compared to the normal environments in which computer operating systems are usually used.

Moreover, the field of operating systems which can apply to be evaluated is restricted to those with strong corporate backing, because of the costs that ensue. In general, you will find the most popular vendors listed here, while this does not mean that other solutions, such as OSS solutions, couldn't reach, or exceed this level of security under certain circumstances, without even having tried to pass this advocacy evaluation.

Contents

[edit] Trusted Solaris

Trusted Solaris is a security-focused version of the Solaris Unix operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, pluggable authentication, mandatory access control, additional physical authentication devices, and fine-grained access control. Versions of Trusted Solaris through version 8 are Common Criteria certified. See [1] and [2] Trusted Solaris Version 8 received the EAL4 certification level augmented by a number of protection profiles. See [3] for explanation of The Evaluation Assurance Levels.

[edit] BAE Systems' STOP

BAE Systems' STOP version 6.0.E received an EAL4+ in April 2004 and the 6.1.E version received an EAL5+ certification in March 2005. Previous versions of STOP have held a B3 certification under TCSEC. While STOP 6 is binary compatible with Linux, it is not derived from the Linux kernel. See [4] for an overview of the system.

[edit] Red Hat Enterprise Linux 3

Red Hat Enterprise Linux 3 was evaluated at EAL2 in February 2004. [5]

[edit] Novell SUSE Linux Enterprise Server

Novell's SUSE Linux Enterprise Server 9 running on an IBM eServer was certified at CAPP/EAL4+ in February 2005. News release at heise.de

[edit] Microsoft Windows

All modern versions of Microsoft Windows have received EAL 4 Augmented ALC_FLR.3 certification:

  • Windows 2000 Server, Advanced Server, and Professional, each with Service Pack 3 and Q326886 Hotfix operating on the x86 platform were certified as CAPP/EAL 4 Augmented ALC_FLR.3in October 2002. (This includes standard configurations as Domain Controller, Server in a Domain, Stand-alone Server, Workstation in a Domain, Stand-alone Workstation)

[edit] Mac OS X

Apple's Mac OS X & Mac OS X Server running 10.3.6 both with the Common Criteria Tools Package installed were certified at CAPP/EAL3 in January 2005. [6][7]

Apple's Mac OS X & Mac OS X Server running the latest version 10.4.6 have not yet been fully evaluated however the Common Criteria Tools package is available. [8]

[edit] GEMSOS

Gemini Multiprocessing Secure Operating System[9] is a CC A1 (EAL7]) system that runs on IA x86 processor type COTS hardware.

[edit] HP OpenVMS and SEVMS

CC B1 system formerly of Digital Equipment Corporation (DEC) later Compaq, now Hewlett-Packard (HP). [10]

[edit] See also

[edit] External links

Languages