This is a list of operating systems specifically focused on security. Similar concepts include security-evaluated operating systems that have achieved certification from an auditing organization, and trusted operating systems that provide sufficient support for multilevel security and evidence of correctness to meet a particular set of requirements.
- CalyxOS is designed for privacy, security, and accessibility.
- DivestOS is a fork of LineageOS that aims to increase privacy and security.
- GrapheneOS is a privacy and security-focused mobile operating system for selected Google Pixel smartphones and tablets.
- Kali NetHunter is a mobile penetration testing platform based on Kali Linux.
- Kali Linux is designed for digital forensics and penetration testing.
- Parrot OS Security Edition is designed for penetration testing, vulnerability assessment and mitigation, computer forensics, and anonymous web browsing.
- Tails is aimed at preserving privacy and anonymity.
- Whonix consists of two virtual machines. All communications are forced through Tor.
- Pentoo is a Live CD and Live USB designed for penetration testing and security assessment.
Other Linux distributions
- Alpine Linux is designed to be small, simple, and secure. It uses musl, BusyBox, and OpenRC instead of the more commonly used glibc, GNU Core Utilities, and systemd.
- Fedora Silverblue is an immutable desktop operating system. Every Silverblue installation is identical to every other installation of the same version, and it never changes as it is used.
- OpenBSD is a Unix-like operating system that emphasizes portability, standardization, correctness, proactive security, and integrated cryptography.
- Qubes OS aims to provide security through isolation. Isolation is provided through the use of virtualization technology. This allows the segmentation of applications into secure virtual machines.
- "About The Calyx Institute - Calyx Institute". calyxinstitute.org. Retrieved 2 November 2021.
- "Kali NetHunter Documentation". Kali Linux Documentation. Retrieved 5 April 2020.
- "Kali Linux 1.0 review". LinuxBSDos.com. 14 March 2013. Retrieved 26 November 2019.
- Simionato, Lorenzo (24 April 2007). "Review: BackTrack 2 security live CD". Linux.com. Retrieved 10 April 2019.
- Barr, Joe (13 June 2008). "Test your environment's security with BackTrack". Linux.com. Retrieved 10 April 2019.
- "BackTrack 4 - Hacking galore". Dedoimedo.com. 15 May 2009. Retrieved 10 April 2019.
- "BackTrack 5 R3 review". LinuxBSDos.com. 17 August 2012. Retrieved 10 April 2019.
- "Parrot Security Could Be Your Next Security Tool". Linux.com | The source for Linux information. 2 December 2016. Retrieved 9 March 2018.
- Vervloesem, Koen (27 April 2011). "The Amnesic Incognito Live System: A live CD for anonymity [LWN.net]". lwn.net. Archived from the original on 21 August 2017. Retrieved 14 June 2017.
- "Devs cook up 'leakproof' all-Tor untrackable platform". The Register. 13 November 2012. Retrieved 10 July 2014.
- Greenburg, Andy (17 June 2014). "How to Anonymize Everything You Do Online". Wired. Retrieved 10 July 2014.
- "Whonix adds a layer of anonymity to your business tasks". TechRepublic. 4 January 2013. Retrieved 10 July 2014.
- Pentoo (Gentoo) Based Linux Review, Features and Screenshot Tour, TecMint.
- KITE Introduces a New Secured FOSS Based Operating System
- A Look at Pentoo Linux and Its Security Analysis Tools, eWeek
- 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
- "about | Alpine Linux". alpinelinux.org.
- says, GigaTux (24 August 2010). "Alpine Linux 2 review | LinuxBSDos.com".
- "Fedora Silverblue User Guide :: Fedora Docs". docs.fedoraproject.org. Archived from the original on 11 October 2021. Retrieved 11 October 2021.
- OpenBSD Project (19 May 2020). "OpenBSD". OpenBSD.org. Retrieved 12 October 2020.
- "Qubes OS bakes in virty system-level security". The Register. 5 September 2012.