In addition to the general certificates listed here, other certificates may have been issued in order to demonstrate specific security requirements for some markets.
Contact us at security-certifications@apple.com if you have any questions.
The following documents can be useful in context with these certifications and validations:
For information on public certifications related to Apple Internet Services, see:
For information on public certifications related to Apple applications, see:
For information on public certifications related to Apple operating systems, see:
- Product security certifications for iOS
- Product security certifications for iPadOS
- Product security certifications for macOS
- Product security certifications for watchOS
- Product security certifications for tvOS
For information on public certifications related to hardware and associated firmware components, see:
- Security certifications for SEP (Secure Key Store)
- Security certifications for T2 and its firmware
Cryptographic module validations
All Apple FIPS 140-2/-3 Conformance Validation Certificates are on the CMVP website. Apple actively engages in the validation of the CoreCrypto User and CoreCrypto Kernel modules for each major release of an operating system. Validation of conformance can only be performed against a final module release version and formally submitted upon OS public release.
The CMVP maintains the validation status of cryptographic modules under four separate lists depending on their current status. The modules may begin in the Implementation Under Test List and then proceed to the Modules in Process List. Once validated they appear on the validated cryptographic modules list, and after five years are moved to the "historical" list.
In 2020, the CMVP adopt the international standard, ISO/IEC 19790, as the basis for FIPS 140-3.
For more information about FIPS 140-2/-3 validations see Apple Platform Security.
Platform/OS | CMVP Certificate Number | Module Name | Module Type | SL | Validation Date | Documents |
---|---|---|---|---|---|---|
macOS user space, kernel space and secure key store (sepOS) are currently under test. Please check the Implementation Under Test List and the Modules in Process List. | ||||||
macOS 10.14 Mojave |
3431 | Apple CoreCrypto Kernel Module v9.0 for Intel | SW | 1 | 2019-04-12 | |
3402 | Apple CoreCrypto User Module v9.0 for Intel | SW | 1 | 2019-04-12 | ||
3523 | Apple Secure Key Store Cryptographic Module v9.0 (sepOS) |
HW | 2 | 10-09-2019 | ||
macOS 10.13 High Sierra |
3156 | Apple CoreCrypto Kernel Module v8.0 for Intel | SW | 1 | 2018-03-22 | |
3155 | Apple CoreCrypto User Module v8.0 for Intel | SW | 1 | 2018-03-22 | ||
3223 | Apple Secure Key Store Cryptographic Module v1.0 (sepOS) |
HW | 1 | 10-09-2019 |
Previous versions
These previous OS X versions had cryptographic module validations. Those greater than five years old will be listed by the CMVP with "historical" status:
- macOS Sierra 10.12
- OS X El Capitan 10.11
- OS X Yosemite 10.10
- OS X Mavericks 10.9
- OS X Mountain Lion 10.8
- OS X Lion 10.7
- OS X Snow Leopard 10.6
Common Criteria (CC) certifications
NIAP typically maintain evaluations on the Product Compliant List for two years, after which they are reviewed for conformance with the current assurance maintenance policy. The CC Portal may maintain products on the certified product list for five years.
The Common Criteria Portal lists certifications that can be mutually recognised under the Common Criteria Recognition Arrangement (CCRA).
For more information about Common Criteria certifications, see Apple Platform Security.
Scheme ID |
Title |
Protection profile(s) |
Date certified |
Documents |
---|---|---|---|---|
Evaluations with NIAP for macOS evaluations using the General purpose operating system and full disk encryption (AA and EE) Protection Profiles are under way. Products in evaluation (NIAP) |
||||
VID11077 | macOS Catalina 10.15 | PP for General Purpose Operating Systems | 2020-09-23 |