This is a list ofoperating systems specifically focused onsecurity. Similar concepts includesecurity-evaluated operating systems that have achieved certification from anauditing organization, andtrusted operating systems that provide sufficient support formultilevel security and evidence ofcorrectness to meet a particular set of requirements.