Template:Short description Template:Use dmy dates
This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.
LinuxEdit
{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}
Android-basedEdit
{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}
- GrapheneOS is a privacy and security-focused mobile operating system for selected Google Pixel smartphones and tablets.
Debian-basedEdit
{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}
|CitationClass=web }}</ref>
- Whonix consists of two virtual machines. All communications are forced through Tor.<ref>{{#invoke:citation/CS1|citation
|CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref><ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>
- Linux Kodachi is a security-focused operating system.<ref>{{#invoke:citation/CS1|citation
|CitationClass=web }}</ref>
Other Linux distributionsEdit
- Alpine Linux is designed to be small, simple, and secure.<ref>{{#invoke:citation/CS1|citation
|CitationClass=web }}</ref> It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>
- Owl - Openwall GNU/Linux, a security-enhanced Linux distribution for servers.
BSDEdit
{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}
- OpenBSD is a Unix-like operating system that emphasizes portability, standardization, correctness, proactive security, and integrated cryptography.<ref>{{#invoke:citation/CS1|citation
|CitationClass=web }}</ref>
XenEdit
{{#invoke:Labelled list hatnote|labelledList|Main article|Main articles|Main page|Main pages}}
|CitationClass=web }}</ref> Isolation is provided through the use of virtualization technology. This allows the segmentation of applications into secure virtual machines.