Contraptional Obligation Mac OS

Posted on  by

In addition to the general certificates listed here, other certificates may have been issued in order to demonstrate specific security requirements for some markets.

Mac OS, operating system (OS) developed by the American computer company Apple Inc. The OS was introduced in 1984 to run the company’s Macintosh line of personal computers (PCs). The Macintosh heralded the era of graphical user interface (GUI) systems, and it inspired Microsoft Corporation to develop its own GUI, the Windows OS. MacOS Big Sur supports most Mac models introduced in 2013 and later. View compatible Mac models. Before you upgrade, make a complete backup with Time Machine, or store your files in iCloud. Learn how to back up your Mac.

Contact us at security-certifications@apple.com if you have any questions.

Mac

The following documents can be useful in context with these certifications and validations:

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP. The Mac OS, Mac OS Server, iPod Software, Apple TV Software or Consumer Software; (iv) Your use of a computer or operating system under APP for iPod that is unrelated to iPod Software or connectivity issues with the Covered Equipment; (v) Your use of a computer or operating system under APP for.

For information on public certifications related to Apple Internet Services, see:

For information on public certifications related to Apple applications, see:

For information on public certifications related to Apple operating systems, see:

For information on public certifications related to hardware and associated firmware components, see:

  • Security certifications for SEP (Secure Key Store)

Cryptographic module validations

All Apple FIPS 140-2/-3 Conformance Validation Certificates are on the CMVP web site. Apple actively engages in the validation of the CoreCrypto User and CoreCrypto Kernel modules for each major release of an operating system. Validation of conformance can only be performed against a final module release version and formally submitted upon OS public release.

Contraptional Obligation Mac OS

Contraption Obligation Mac Os X

The CMVP maintains the validation status of cryptographic modules under four separate lists depending on their current status. The modules may begin in the Implementation Under Test List and then proceed to the Modules in Process List. Once validated they appear on the validated cryptographic modules list, and after five years are moved to the 'historical' list.

Contraption Obligation Mac Os Catalina

In 2020 the CMVP adopt the international standard, ISO/IEC 19790, as the basis for FIPS 140-3.

For more information about FIPS 140-2/-3 validations see Apple Platform Security.

Platform/OSCMVP Certificate NumberModule NameModule TypeSLValidation DateDocuments
macOS user space, kernel space, and secure key store (sepOS) are currently under test. Please check the Implementation Under Test List and the Modules in Process List.
macOS 10.14
Mojave
3431Apple CoreCrypto Kernel Module v9.0 for IntelSW12019-04-12
3402Apple CoreCrypto User Module v9.0 for IntelSW12019-04-12
3523

Apple Secure Key Store Cryptographic Module v9.0

(sepOS)

HW22019-09-10
macOS 10.13
High Sierra
3156Apple CoreCrypto Kernel Module v8.0 for IntelSW12018-03-22
3155Apple CoreCrypto User Module v8.0 for IntelSW12018-03-22
3223Apple Secure Key Store Cryptographic Module v1.0
(sepOS)
HW12019-09-10

Previous versions

These previous OS X versions had cryptographic module validations. Those greater than five years old are listed by the CMVP with 'historical' status:

  • macOS Sierra 10.12
  • OS X El Capitan 10.11
  • OS X Yosemite 10.10
  • OS X Mavericks 10.9
  • OS X Mountain Lion 10.8
  • OS X Lion 10.7
  • OS X Snow Leopard 10.6

Common Criteria (CC) certifications

NIAP typically maintain evaluations on the Product Compliant List for 2 years after which they are reviewed for conformance with the current assurance maintenance policy. The CC Portal may maintain products on the certified product list for 5 years.

The Common Criteria Portal lists certifications that can be mutually recognized under the Common Criteria Recognition Arrangement (CCRA).

Contraption Obligation Mac Os 11

For more information about Common Criteria certifications see Apple Platform Security.

Scheme ID

Title

Protection Profile(s)

Date Certified

Documents

Evaluations with NIAP for macOS evaluations using the General purpose operating system and full disk encryption(AA and EE) Protection Profiles are underway.

Products in evaluation (NIAP)

VID11077macOS Catalina 10.15PP for General Purpose Operating Systems2020-09-23