5.6. Implementation Examples

This chapter has focused on designing the security aspects of operating systems, which in turn can contribute to the overall security of a computing system. Fortunately, not every application requires A1- or F–A1/E6-quality security; few operating systems have the features needed to make them A1 or have been built with the care and discipline necessary to be judged E6.

In this section, we examine several commonly used operating systems, looking at features such as access control, security kernel, and design. Two examples are drawn from the general commercial world, and two more from the restricted world of TCSEC-inspired systems. We cover only features relevant to security, and then only some of those features.

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.