Security-evaluated operating system

Last updated

In computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2.

Contents

Oracle Solaris

Trusted Solaris 8 was a security-focused version of the Solaris Unix operating system. Aimed primarily at the government computing sector, Trusted Solaris adds detailed auditing of all tasks, pluggable authentication, mandatory access control, additional physical authentication devices, and fine-grained access control(FGAC). Versions of Trusted Solaris through version 8 are Common Criteria certified. [1] [2]

Trusted Solaris Version 8 received the EAL 4 certification level augmented by a number of protection profiles. [nb 1]

BAE Systems' STOP

BAE Systems' STOP version 6.0.E received an EAL4+ in April 2004 and the 6.1.E version received an EAL5+ certification in March 2005. STOP version 6.4 U4 received an EAL5+ certification in July 2008. Versions of STOP prior to STOP 6 have held B3 certifications under TCSEC. While STOP 6 is binary compatible with Linux, it does not derive from the Linux kernel. See for an overview of the system. [3]

Red Hat Enterprise Linux

Red Hat Enterprise Linux Version 7.1 achieved EAL4+ in October 2016. [4]

Red Hat Enterprise Linux Version 6.2 on 32 bit x86 Architecture achieved EAL4+ in December 2014. [5] Red Hat Enterprise Linux Version 6.2 with KVM Virtualization for x86 Architectures achieved EAL4+ in October 2012. [6]

Red Hat Enterprise Linux 5 achieved EAL4+ in June 2007. [7] [8]

Novell SUSE Linux Enterprise Server

Novell's SUSE Linux Enterprise Server 15 is certified for IBM Z, Arm and x86-64 at CAPP/EAL4+ in August 2021. See [9]

Novell's SUSE Linux Enterprise Server 9 running on an IBM eServer was certified at CAPP/EAL4+ in February 2005. See News release at heise.de

Microsoft Windows

The following versions of Microsoft Windows have received EAL 4 Augmented ALC_FLR.3 certification:

Mac OS X

Apple's Mac OS X and Mac OS X Server running 10.3.6 both with the Common Criteria Tools Package installed were certified at CAPP/EAL3 in January 2005.

Apple's Mac OS X & Mac OS X Server running the latest version 10.4.6 have not yet been fully evaluated however the Common Criteria Tools package is available. [10]

GEMSOS

Gemini Multiprocessing Secure Operating System is a TCSEC A1 system that runs on x86 processor type COTS hardware.

OpenVMS and SEVMS

The SEVMS [11] enhancement to VMS was a CC B1/B3 [12] system formerly of Digital Equipment Corporation (DEC). A standard OpenVMS installation is rated as CC C2. [13]

Green Hills INTEGRITY-178B

Green Hills Software's INTEGRITY-178B real-time operating system was certified at Common Criteria EAL6+ in September 2008. running on an embedded PowerPC processor on a Compact PCI card.

Unisys MCP

The Unisys MCP operating system includes an implementation of the DoD Orange Book C2 specification, the controlled access protection sub-level of discretionary protection. [14] MCP/AS obtained the C2 rating in August, 1987. [15]

Unisys OS 2200

The Unisys OS 2200 operating system includes an implementation of the DoD Orange Book B1, Labeled security protection level specification. [14] OS 2200 first obtained a successful B1 evaluation in September, 1989. [16] Unisys maintained that evaluation until 1994 through the National Computer Security Center Rating Maintenance Phase (RAMP) of the Trusted Product Evaluation Program. [17] [18]

See also

Notes

  1. See 6 Evaluation assurance levels for explanation of The Evaluation Assurance Levels.

Related Research Articles

<span class="mw-page-title-main">Oracle Solaris</span> Unix operating system originally developed by Sun Microsystems

Solaris is a proprietary Unix operating system originally developed by Sun Microsystems. After the Sun acquisition by Oracle in 2010, it was renamed Oracle Solaris.

The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification. It is currently in version 3.1 revision 5.

Trusted Operating System (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.

<span class="mw-page-title-main">UEFI</span> Operating system and firmware specification

Unified Extensible Firmware Interface is a specification that defines the architecture of the platform firmware used for booting the computer hardware and its interface for interaction with the operating system. Examples of firmware that implement the specification are AMI Aptio, Phoenix SecureCore, TianoCore EDK II, InsydeH2O. UEFI replaces the BIOS which was present in the boot ROM of all personal computers that are IBM PC compatible, although it can provide backwards compatibility with the BIOS using CSM booting. Intel developed the original Extensible Firmware Interface (EFI) specification. Some of the EFI's practices and data formats mirror those of Microsoft Windows. In 2005, UEFI deprecated EFI 1.10.

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, IO devices, etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object is tested against the set of authorization rules to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects are tables, views, procedures, etc.

Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications, permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization. There are two contexts for the use of multilevel security.

The Evaluation Assurance Level of an IT product or system is a numerical grade assigned following the completion of a Common Criteria security evaluation, an international standard in effect since 1999. The increasing assurance levels reflect added assurance requirements that must be met to achieve Common Criteria certification. The intent of the higher levels is to provide higher confidence that the system's principal security features are reliably implemented. The EAL level does not measure the security of the system itself, it simply states at what level the system was tested.

PowerLinux is the combination of a Linux-based operating system (OS) running on PowerPC- or Power ISA-based computers from IBM. It is often used in reference along with Linux on Power, and is also the name of several Linux-only IBM Power Systems.

Microsoft Virtual Server was a virtualization solution that facilitated the creation of virtual machines on the Windows XP, Windows Vista and Windows Server 2003 operating systems. Originally developed by Connectix, it was acquired by Microsoft prior to release. Virtual PC is Microsoft's related desktop virtualization software package.

IBM Z Family name used by IBM for its z/Architecture mainframe computers

IBM Z is a family name used by IBM for all of its z/Architecture mainframe computers. In July 2017, with another generation of products, the official family was changed to IBM Z from IBM z Systems; the IBM Z family now includes the newest model, the IBM z16, as well as the z15, the z14, and the z13, the IBM zEnterprise models, the IBM System z10 models, the IBM System z9 models and IBM eServer zSeries models.

The XTS-400 is a multilevel secure computer operating system. It is multiuser and multitasking that uses multilevel scheduling in processing data and information. It works in networked environments and supports Gigabit Ethernet and both IPv4 and IPv6.

Solaris Trusted Extensions is a set of security extensions incorporated in the Solaris 10 operating system by Sun Microsystems, featuring a mandatory access control model. It succeeds Trusted Solaris, a family of security-evaluated operating systems based on earlier versions of Solaris.

The following is a timeline of virtualization development. In computing, virtualization is the use of a computer to simulate another computer. Through virtualization, a host simulates a guest by exposing virtual hardware devices, which may be done through software or by allowing access to a physical device connected to the machine.

<span class="mw-page-title-main">Oracle Linux</span> Linux distribution by Oracle

Oracle Linux is a Linux distribution packaged and freely distributed by Oracle, available partially under the GNU General Public License since late 2006. It is compiled from Red Hat Enterprise Linux (RHEL) source code, replacing Red Hat branding with Oracle's. It is also used by Oracle Cloud and Oracle Engineered Systems such as Oracle Exadata and others.

Adaptive Internet Protocol (AIP) is a multi-channel protocol that allows an application running on any of multiple platforms to be displayed on any of a wide range of client systems. It supports rich remote display and input services with a number of display options to deliver the presentation of the remote applications onto the local display either as a standalone window, or within a contained remote environment delivered full-screen or in a standalone window. The protocol also supports audio, printing, and other device mapping services.

The ES7000 is Unisys's x86/Windows, Linux and Solaris-based server product line. The "ES7000" brand has been used since 1999, although variants and models within the family support various processor and bus architectures. The server is marketed and positioned as a scale-up platform where scale-out becomes inefficient. Typically the ES7000 is utilized as a platform for homogeneous consolidation, large databases, Business Intelligence, Decision Support Systems, ERP, virtualization, as well as large Linux application hosting.

Oracle VM Server for x86 is the server virtualization offering from Oracle Corporation. Oracle VM Server for x86 incorporates the free and open-source Xen hypervisor technology, supports Windows, Linux, and Solaris guests and includes an integrated Web based management console. Oracle VM Server for x86 features fully tested and certified Oracle Applications stack in an enterprise virtualization environment.

LynxSecure is a least privilege real-time separation kernel hypervisor from Lynx Software Technologies designed for safety and security critical applications found in military, avionic, industrial, and automotive markets.

Linux on IBM Z or Linux on zSystems is the collective term for the Linux operating system compiled to run on IBM mainframes, especially IBM Z / IBM zSystems and IBM LinuxONE servers. Similar terms which imply the same meaning are Linux/390, Linux/390x, etc. The three Linux distributions certified for usage on the IBM Z hardware platform are Red Hat Enterprise Linux, SUSE Linux Enterprise Server, and Ubuntu.

Inspur K-UX is a Linux distribution based on Red Hat Enterprise Linux produced by Inspur, a Chinese multinational company specializing in information technology. Inspur K-UX 2.0 and 3.0 for x86-64 were officially certified as UNIX systems by The Open Group.

References

  1. Fischer, PJ (30 March 2004). "CESG INFORMATION ASSURANCE AND CERTIFICATION SERVICES". Archived from the original on 12 March 2007.{{cite web}}: CS1 maint: unfit URL (link)
  2. "Sun Common Criteria Certification". Sun Microsystems. 2004-10-13. Archived from the original on 13 October 2004. Retrieved 2023-02-17.
  3. www.baesystems.com https://www.baesystems.com/ProductsServices/bae_prod_csit_xts400.html . Retrieved 2024-03-01.{{cite web}}: Missing or empty |title= (help)
  4. "Red Hat Achieves Common Criteria Security Certification for Red Hat Enterprise Linux 7". www.redhat.com. 26 October 2016. Retrieved 2023-02-17.
  5. Weber, Joachim (28 May 2010). Certification Report BSI-DSZ-CC-0924-2014 for Red Hat Enterprise Linux on 32 bit x86 Architecture, Version 6.2 from Red Hat, Inc (PDF) (Report).
  6. Kowalski, Bernd (23 October 2012). Cerfification Report BSI-DSZ-CC-0754-2012 for Red Hat Enterprise Linux, Version 6.2 with KVM Virtualization for x86 Architectures from Red Hat, Inc (PDF) (Report). Federal Office for Information Security.
  7. "CCEVS: Validated Product - Red Hat Enterprise Linux Version 5". Archived from the original on 2007-12-14.
  8. "NIAP".
  9. "SUSE Linux Enterprise Earns Common Criteria EAL 4+,..." www.suse.com. Retrieved 2024-03-01.
  10. "Apple - Support - Downloads - Common Criteria Tools for 10.4". www.apple.com. Archived from the original on 2005-05-03.
  11. "Security Enhanced VMS (SEVMS)". Hewlett Packard. Archived from the original on 2015-11-19.
  12. "OpenVMS security presentation" (PDF). Archived from the original (PDF) on 2007-10-24. Retrieved 2006-06-16.
  13. National Computer Security Center (NCSC) Trusted Product Evaluation List (TPEL)
  14. 1 2 Department of Defense Trusted Computer System Evaluation Criteria (NSI 5200.28-STD). National Security Institute. 1985. Archived from the original on 2009-06-25. Retrieved 2015-06-03.
  15. Final Evaluation Report of Unisys Corporation A Series MCP/AS Release 3.7 (CSC-EPL-87/003, Library No. S228,515) (PDF). Fort George G. Meade, MD: National Computer Security Center. September 27, 1989. Archived (PDF) from the original on March 4, 2016.
  16. Final Evaluation Report of Unisys Corporation OS 1100 (CSC-EPL-89/004, Library No. S33,122) (PDF). Fort George G. Meade, MD: National Computer Security Center. September 27, 1989. Archived (PDF) from the original on February 24, 2017.
  17. Final Evaluation Report Unisys Corporation OS 1100/2200 (CSC-EPL-76/999, Library No. S225,nnn). Fort George G. Meade, MD: National Computer Security Center. July 26, 1994.
  18. Rating Maintenance Phase Program Document (NCSC-TG-013-89, Library No. S-232,468). Fort George G. Meade, MD: National Computer Security Center. 23 June 1989. Archived from the original on 5 March 2016. Retrieved 3 June 2015.