List of security-focused operating systems

From HandWiki
Short description: None


This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.

Linux

Android-based

  • GrapheneOS is a Security-focused, Android-based mobile OS that uses a hardened kernel, C library, custom memory allocator (hardened_malloc), and custom privacy and security focused Chromium based browser named Vanadium[1]. it also offers privacy/security features, such as Duress PIN/Password or disabling the USB-C port at a driver/hardware level to avoid exploitation. it enables multiple exploit mitigations such as memory tagging, secure app spawning, restricted dynamic code loading, and more.[2]

Debian-based

  • Linux Kodachi is a security-focused operating system.[3]
  • Tails is aimed at preserving privacy and anonymity.[4]
  • KickSecure is a security-focused Linux distribution that aims to be "hardened by default". It uses network hardening, kernel hardening, Strong Linux User Account Isolation, better randomness, root access restrictions, and app-specific hardening.[5]
    • Whonix is an anonymity focused operating system based on KickSecure. It consists of two virtual machines, And all communications are routed through Tor.[6][7][8]

Other Linux distributions

  • Alpine Linux is designed to be small, simple, and secure.[9] It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.[10]
  • Owl - Openwall GNU/Linux, a security-enhanced Linux distribution for servers.
  • Secureblue, a Fedora Silverblue based distro that uses a hardened kernel, custom memory allocator (hardened_malloc), Trivalent, a security-focused, Chromium-based browser inspired by Vanadium, and many other exploit mitigations.[11]

BSD

Xen

See also

References

  1. "Features overview | GrapheneOS - Vanadium: hardened WebView and default browser" (in en). https://grapheneos.org/features#Vanadium. 
  2. "Features overview | GrapheneOS" (in en). https://grapheneos.org/features. 
  3. Choudhury, Ambika (2019-06-04). "10 Most Secured Linux Distros For Advanced Privacy & Security" (in en-US). https://analyticsindiamag.com/ai-mysteries/10-most-secured-linux-distros-for-advanced-privacy-security/. 
  4. Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net"]. https://lwn.net/Articles/440279/. 
  5. "Kicksecure - A Security Hardened Linux Distribution" (in en). 2026-01-29. https://www.kicksecure.com/wiki/About. 
  6. "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 Nov 2012. https://www.theregister.co.uk/2012/11/13/whonix/. 
  7. Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. https://www.wired.com/2014/06/be-anonymous-online/. 
  8. "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. http://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/. 
  9. "about | Alpine Linux". https://alpinelinux.org/about/. 
  10. says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com". https://linuxbsdos.com/2010/08/23/alpine-linux-2-review/. 
  11. "Features | secureblue" (in en). https://secureblue.dev/features. 
  12. OpenBSD Project (19 May 2020). "OpenBSD". https://www.openbsd.org/. 
  13. "Qubes OS bakes in virty system-level security". The Register. September 5, 2012. https://www.theregister.co.uk/2012/09/05/qubes_secure_os_released/.