Trusted operating system
   HOME

TheInfoList



OR:

Trusted Operating System (TOS) generally refers to an
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
that provides sufficient support for
multilevel security Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications (i.e., at different security levels), permit access by users with different security clearan ...
and evidence of correctness to meet a particular set of government requirements. The most common set of criteria for trusted operating system design is the Common Criteria combined with the Security Functional Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and
mandatory access control In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a ''subject'' or ''initiator'' to access or generally perform some sort of operation on a ...
(MAC). The Common Criteria is the result of a multi-year effort by the governments of the U.S., Canada, United Kingdom, France, Germany, the Netherlands and other countries to develop a harmonized security criteria for IT products.


Examples

Examples of certified trusted operating systems are: * Apple Mac OS X 10.6 (Rated EAL 3+) * HP-UX 11i v3 (Rated EAL 4+) * Some
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, w ...
distributions (Rated up to EAL 4+) * Microsoft Windows 7 and Microsoft Server 2008 R2 (Rated EAL 4+) * AIX 5L with PitBull Foundation (Rated EAL 4+) * Trusted Solaris * Trusted UNICOS 8.0 (Rated B1) *
XTS-400 The XTS-400 is a multilevel secure computer operating system. It is multiuser and multitasking that uses multilevel scheduling in processing data and information. It works in networked environments and supports Gigabit Ethernet and both IPv4 ...
(Rated EAL5+) * IBM VM (SP, BSE, HPO, XA, ESA, etc.) with
RACF Introduction RACF, ronounced Rack-Effshort for Resource Access Control Facility, is an IBM software product. It is a security system that provides access control and auditing functionality for the z/OS and z/VM operating systems. RACF was in ...
Examples of operating systems that might be certifiable are: * FreeBSD with the TrustedBSD extensionsFreeBSD statement about support of Common Criteria requirements : *
SELinux Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications and user-space ...
(se
FAQ
Companies that have created trusted operating systems include: * Addamax (BSD, SVR3, SVR4, HP/UX) * Argus Systems Group (Solaris, AIX, Linux) *
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile te ...
(System V) * BAE Systems (XTS Unix) *
Bull A bull is an intact (i.e., not castrated) adult male of the species ''Bos taurus'' (cattle). More muscular and aggressive than the females of the same species (i.e., cows), bulls have long been an important symbol in many religions, includin ...
(AIX) *
Data General Data General Corporation was one of the first minicomputer firms of the late 1960s. Three of the four founders were former employees of Digital Equipment Corporation (DEC). Their first product, 1969's Data General Nova, was a 16-bit minicompute ...
(DG/UX) *
Digital Equipment Corporation Digital Equipment Corporation (DEC ), using the trademark Digital, was a major American company in the computer industry from the 1960s to the 1990s. The company was co-founded by Ken Olsen and Harlan Anderson in 1957. Olsen was president un ...
(Ultrix) *
Forcepoint Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions. Forcepoint ...
(Hardened SELinux) * Gemini Computers (GEMSOS) * General Dynamics C4 Systems (Linux) * Harris Corporation (SVR3, SVR4) * Hewlett-Packard (HP/UX) *
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building technologies, performance ma ...
(Multics) * IBM (OS/390, AIX) * SCO (SCO Unix) * Secure Computing Corporation (LOCK, Mach, BSD) * SecureWare (Apple A/UX, HP/UX, SCO) *
Sequent Computer Systems Sequent Computer Systems was a computer company that designed and manufactured multiprocessing computer systems. They were among the pioneers in high-performance symmetric multiprocessing (SMP) open systems, innovating in both hardware (e.g., ca ...
(Dynix/ptx) *
Silicon Graphics Silicon Graphics, Inc. (stylized as SiliconGraphics before 1999, later rebranded SGI, historically known as Silicon Graphics Computer Systems or SGCS) was an American high-performance computing manufacturer, producing computer hardware and sof ...
(IRIX) * Sun Microsystems (SunOS, Solaris) * Trusted Information Systems (Xenix, Mach)


See also

* Common Criteria *
Comparison of operating systems These tables provide a comparison of operating systems, of computer devices, as listing general and technical information for a number of widely used and currently available PC or handheld (including smartphone and tablet computer) operating sy ...
* Security-evaluated operating system *
Security-focused operating system This is a list of operating systems specifically focused on security. Operating systems for general-purpose usage may be secure without having a specific focus on security. Similar concepts include security-evaluated operating systems that have ...


References

{{reflist


External links


Common Criteria Portal - certified products

NSA FAQ on SELinux

Argus Systems
Operating system security