List of security-focused operating systems
From HandWiki
Short description: None
This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.
Linux
Android-based
- GrapheneOS is a Security-focused, Android-based mobile OS that uses a hardened kernel, C library, custom memory allocator (
hardened_malloc), and custom privacy and security focused Chromium based browser named Vanadium[1]. it also offers privacy/security features, such as Duress PIN/Password or disabling the USB-C port at a driver/hardware level to avoid exploitation. it enables multiple exploit mitigations such as memory tagging, secure app spawning, restricted dynamic code loading, and more.[2]
Debian-based
- Linux Kodachi is a security-focused operating system.[3]
- Tails is aimed at preserving privacy and anonymity.[4]
- KickSecure is a security-focused Linux distribution that aims to be "hardened by default". It uses network hardening, kernel hardening, Strong Linux User Account Isolation, better randomness, root access restrictions, and app-specific hardening.[5]
Other Linux distributions
- Alpine Linux is designed to be small, simple, and secure.[9] It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.[10]
- Owl - Openwall GNU/Linux, a security-enhanced Linux distribution for servers.
- Secureblue, a Fedora Silverblue based distro that uses a hardened kernel, custom memory allocator (
hardened_malloc), Trivalent, a security-focused, Chromium-based browser inspired by Vanadium, and many other exploit mitigations.[11]
BSD
- OpenBSD is a Unix-like operating system that emphasizes portability, standardization, correctness, proactive security, and integrated cryptography.[12]
Xen
- Qubes OS aims to provide security through isolation.[13] Isolation is provided through the use of virtualization technology. This allows the segmentation of applications into secure virtual machines.
See also
- Computer security
- Comparison of operating systems
- Comparison of mobile operating systems
- Security engineering
References
- ↑ "Features overview | GrapheneOS - Vanadium: hardened WebView and default browser" (in en). https://grapheneos.org/features#Vanadium.
- ↑ "Features overview | GrapheneOS" (in en). https://grapheneos.org/features.
- ↑ Choudhury, Ambika (2019-06-04). "10 Most Secured Linux Distros For Advanced Privacy & Security" (in en-US). https://analyticsindiamag.com/ai-mysteries/10-most-secured-linux-distros-for-advanced-privacy-security/.
- ↑ Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net"]. https://lwn.net/Articles/440279/.
- ↑ "Kicksecure - A Security Hardened Linux Distribution" (in en). 2026-01-29. https://www.kicksecure.com/wiki/About.
- ↑ "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 Nov 2012. https://www.theregister.co.uk/2012/11/13/whonix/.
- ↑ Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. https://www.wired.com/2014/06/be-anonymous-online/.
- ↑ "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. http://www.techrepublic.com/blog/smb-technologist/whonix-adds-a-layer-of-anonymity-to-your-business-tasks/.
- ↑ "about | Alpine Linux". https://alpinelinux.org/about/.
- ↑ says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com". https://linuxbsdos.com/2010/08/23/alpine-linux-2-review/.
- ↑ "Features | secureblue" (in en). https://secureblue.dev/features.
- ↑ OpenBSD Project (19 May 2020). "OpenBSD". https://www.openbsd.org/.
- ↑ "Qubes OS bakes in virty system-level security". The Register. September 5, 2012. https://www.theregister.co.uk/2012/09/05/qubes_secure_os_released/.
| This article is part of a series on |
| Information security |
|---|
| Related security categories |
| Threats |
| Defenses |
