Template:Short description Template:Use dmy dates

This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

LinuxEdit

{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}

Android-basedEdit

{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}

Debian-basedEdit

{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}

|CitationClass=web }}</ref>

|CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>

  • Linux Kodachi is a security-focused operating system.<ref>{{#invoke:citation/CS1|citation

|CitationClass=web }}</ref>

Other Linux distributionsEdit

  • Alpine Linux is designed to be small, simple, and secure.<ref>{{#invoke:citation/CS1|citation

|CitationClass=web }}</ref> It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>

  • Owl - Openwall GNU/Linux, a security-enhanced Linux distribution for servers.

BSDEdit

{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}

|CitationClass=web }}</ref>

XenEdit

{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}

  • Qubes OS aims to provide security through isolation.<ref>{{#invoke:citation/CS1|citation

|CitationClass=web }}</ref> Isolation is provided through the use of virtualization technology. This allows the segmentation of applications into secure virtual machines.

See alsoEdit

Template:Columns-list

ReferencesEdit

Template:Reflist

Template:Information security