Jump to content

List of security-focused operating systems

From Wikipedia, the free encyclopedia

This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

[edit]

Android-based

[edit]
  • GrapheneOS is a Security-focused, Android-based mobile OS that uses a hardened kernel, C library, custom memory allocator (hardened_malloc), and custom privacy and security focused Chromium based browser named Vanadium[1]. it also offers privacy/security features, such as Duress PIN/Password or disabling the USB-C port at a driver/hardware level to avoid exploitation. it enables multiple exploit mitigations such as memory tagging, secure app spawning, restricted dynamic code loading, and more.[2]

Debian-based

[edit]
  • Linux Kodachi is a security-focused operating system.[3]
  • Tails is aimed at preserving privacy and anonymity.[4]
  • KickSecure is a security-focused Linux distribution that aims to be "hardened by default". It uses network hardening, kernel hardening, Strong Linux User Account Isolation, better randomness, root access restrictions, and app-specific hardening.[5]

Other Linux distributions

[edit]
  • Alpine Linux is designed to be small, simple, and secure.[9] It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.[10]
  • Owl - Openwall GNU/Linux, a security-enhanced Linux distribution for servers.
  • Secureblue, a Fedora Silverblue based distro that uses a hardened kernel, custom memory allocator (hardened_malloc), Trivalent, a security-focused, Chromium-based browser inspired by Vanadium, and many other exploit mitigations.[11]

BSD

[edit]

Xen

[edit]

See also

[edit]

References

[edit]
  1. ^ "Features overview | GrapheneOS - Vanadium: hardened WebView and default browser". grapheneos.org. Retrieved 31 March 2026.
  2. ^ "Features overview | GrapheneOS". grapheneos.org. Retrieved 31 March 2026.
  3. ^ Choudhury, Ambika (4 June 2019). "10 Most Secured Linux Distros For Advanced Privacy & Security". AIM. Retrieved 1 November 2024.
  4. ^ Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]". lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017.
  5. ^ "Kicksecure - A Security Hardened Linux Distribution". Kicksecure. 29 January 2026. Retrieved 31 March 2026.
  6. ^ "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 November 2012. Retrieved 10 July 2014.
  7. ^ Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. Retrieved 10 July 2014.
  8. ^ "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. Retrieved 10 July 2014.
  9. ^ "about | Alpine Linux". alpinelinux.org.
  10. ^ says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com".
  11. ^ "Features | secureblue". secureblue.dev. Retrieved 31 March 2026.
  12. ^ OpenBSD Project (19 May 2020). "OpenBSD". OpenBSD.org. Retrieved 12 October 2020.
  13. ^ "Qubes OS bakes in virty system-level security". The Register. 5 September 2012.