
Security certifications for macOS

macOS certification background
Apple actively engages in the validation of Apple operating systems for each major release of an operating system, using appropriate collaborative Protection Profiles, and FIPS 140-3 security levels. Validation of conformance can only be performed against a final released version.
macOS cryptographic module validation status
The Cryptographic Module Validation Program (CMVP) maintains the validation status of cryptographic modules under three separate lists depending on their current status:
To be listed on the CMVP Implementation Under Test List, the laboratory must be contracted with Apple to provide testing.
After the testing has been completed by the laboratory, the lab has recommended validation by the CMVP, and the CMVP fees have been paid, the module is then added to the Modules in Process (MIP) List. The MIP List tracks the progress of the CMVP validation efforts in four phases:
Review Pending: Waiting for CMVP resource to be assigned.
In Review: CMVP resources are performing their validation activities.
Coordination: The lab and the CMVP are resolving any issues found.
Finalization: The activities and formalities related to issuing the certificate.
After validation by the CMVP, the modules are awarded a certificate of conformance and added to the validated cryptographic modules list.This includes:
Validated modules that are marked as active.
After 5 years the modules are marked as historical.
If the module certificate is revoked for some reason, then it is marked as revoked.
In 2020, the CMVP adopted the international standard ISO/IEC 19790 as the basis for FIPS 140-3.
For Apple Mac computers, the table below shows which cryptographic modules are applicable to which Mac technology.
Cryptographic module | Mac computers with Apple silicon | Mac computers with the Apple T2 Security Chip | Intel-based Mac computers without the Apple T2 Security Chip |
|---|---|---|---|
Apple silicon User Space |
|
|
|
Apple silicon Kernel |
|
|
|
Intel User Space |
|
|
|
Intel Kernel |
|
|
|
Secure Key Store |
|
|
|
FIPS 140-3 certifications
In 2020, Apple released Mac computers that are based on Apple silicon. The applicability of cryptographic modules to either Apple silicon or Intel-based Mac computers are indicated in the Module Info column in the table below.
Note: Apple T2 Security chips are included in many Intel-based Mac computers. For information about T2 chip certifications see Security certifications for the Apple T2 Security Chip.
macOS ssh client
OpenSSH can be configured to use FIPS 140-3 validated modules for select FIPS 140-3 algorithms.Organizations can run a signed and notarized installer that is available from Apple with the password FIPS140Mode. The installer places two files on the Mac:
fips_ssh_config: Placed in /private/etc/ssh/ssh_config.d/
fips_sshd_config: Placed in /private/etc/ssh/sshd_config.d/
macOS then uses these files to limit the ciphers available to OpenSSH to only those which have been validated by NIST and ensures that the OpenSSH client uses the platform-provided, validated, cryptographic module. Administrators can also create their own files. For more information, see the apple_ssh_and_fips man page in macOS 12.0.1 or later.
Current status
macOS 11 Big Sur user space, kernel space, and secure key store have completed laboratory testing and have been recommended by the laboratory to the CMVP for validation. They are listed on the Modules in Process List.
macOS 12 Monterey user space, kernel space, and secure key store are undergoing laboratory testing. They are listed on the Implementation Under Test List.
Dates | Certificates / Documents | Module info |
|---|---|---|
Operating system release date: 2021 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v12.0 Operating system: macOS 12 Monterey on Apple silicon Environment: Apple silicon, User, Software Type: Software Security level: 1 |
Operating system release date: 2021 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v12.0 Operating system: macOS 12 Monterey on Apple silicon Environment: Apple silicon, Kernel, Software Type: Software Security level: 1 |
Operating system release date: 2021 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v12.0 Operating system: macOS 12 Monterey on Intel Environment: Intel, User, Software Type: Software Security level: 1 |
Operating system release date: 2021 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v12.0 Operating system: macOS 12 Monterey on Intel Environment: Intel, Kernel, Software Type: Software Security level: 1 |
Operating system release date: 2021 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v12.0 Operating system: sepOS distributed with macOS 12 Monterey on Apple silicon, sepOS distributed with macOS 12 Monterey on Intel with T2 Environment: Apple silicon, Secure Key Store, Hardware Type: Hardware (M1 and T2) Security level: 2 |
Operating system release date: 2021 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v12.0 Operating system: sepOS distributed with macOS 12 Monterey on Apple silicon Environment: Apple silicon, Secure Key Store, Hardware Type: Hardware (M1) Security level: 2 Physical security level: 3 |
Operating system release date: 2020 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v11.1 Operating system: macOS 11 Big Sur on Intel Environment: Intel, User, Software Type: Software Security level: 1 |
Operating system release date: 2020 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v11.1 Operating system: macOS 11 Big Sur on Intel Environment: Intel, Kernel, Software Type: Software Security level: 1 |
Operating system release date: 2020 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v11.1 Operating system: macOS 11 Big Sur on Apple silicon Environment: Apple silicon, User, Software Type: Software Security level: 1 |
Operating system release date: 2020 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v11.1 Operating system: macOS 11 Big Sur on Apple silicon Environment: Apple silicon, Kernel, Software Type: Software Security level: 1 |
Operating system release date: 2020 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v11.1 Operating system: sepOS distributed with macOS 11 Big Sur on Apple silicon, sepOS distributed with macOS 11 Big Sur on Intel Environment: Apple silicon, Secure Key Store, Hardware Type: Hardware (M1) Security level: 2 |
Operating system release date: 2020 Validation dates: — | Certificates: Not yet certified Documents: | Title: Apple Corecrypto Module v11.1 Operating system: sepOS distributed with macOS 11 Big Sur on Apple silicon Environment: Apple silicon, Secure Key Store, Hardware Type: Hardware (M1) Security level: 2 Physical security level: 3 |
FIPS 140-2 certifications
The table below shows the cryptographic modules that are currently being tested and have been tested by the laboratory for conformance with FIPS 140-2.
macOS 10.15 Catalina user space, kernel space, and secure key store have completed laboratory testing and have been recommended by the laboratory to the CMVP for validation. They are listed on the Modules in Process List.
Note: Apple T2 Security chips are included in many Intel-based Mac computers. For information about T2 chip certifications see Security certifications for the Apple T2 Security Chip.
Dates | Certificates / Documents | Module info |
|---|---|---|
Operating system release date: 2019 Validation dates: 2021-03-24 | Certificates: 3859 Documents: | Title: Apple Corecrypto User Space Module for Intel (ccv10) Operating system: macOS 10.15 Catalina Type: Software Security level: 1 |
Operating system release date: 2019 Validation dates: 2021-03-24 | Certificates: 3858 Documents: | Title: Apple Corecrypto Kernel Module v10.0 for Intel (ccv10) Operating system: macOS 10.15 Catalina Type: Software Security level: 1 |
Operating system release date: 2018 Validation dates: 2019-04-12 | Certificates: 3402 Documents: | Title: Apple Corecrypto User Module v9.0 for Intel Operating system: macOS 10.14 Mojave Type: Software Security level: 1 |
Operating system release date: 2018 Validation dates: 2019-04-12 | Certificates: 3431 Documents: | Title: Apple Corecrypto Kernel Module v9.0 for Intel Operating system: macOS 10.14 Mojave Type: Software Security level: 1 |
Operating system release date: 2017 Validation dates: 2018-03-22 | Certificates: 3155 Documents: | Title: Apple Corecrypto User Module v8.0 for Intel Operating system: macOS 10.13 High Sierra Type: Software Security level: 1 |
Operating system release date: 2017 Validation dates: 2018-03-22 | Certificates: 3156 Documents: | Title: Apple Corecrypto Kernel Module v8.0 for Intel Operating system: macOS 10.13 High Sierra Type: Software Security level: 1 |
Previous versions
These previous OS X and macOS versions had cryptographic module validations. Those greater than 5 years old are listed by the CMVP with historical status:
macOS 10.12 Sierra
OS X 10.11 El Capitan
OS X 10.10 Yosemite
OS X 10.9 Mavericks
OS X 10.8 Mountain Lion
OS X 10.7 Lion
OS X 10.6 Snow Leopard
Common Criteria (CC) certification background
Apple actively engages in the evaluation of macOS for each major release of the operating system. Evaluation can only be performed against a final publicly released version of the operating system.
Common Criteria (CC) certification status
The U.S. scheme, operated by NIAP, maintains a list of Products in Evaluation; this list includes products that are currently undergoing evaluation in the United States with a NIAP-approved Common Criteria Testing Laboratory (CCTL) and that have completed an Evaluation Kickoff Meeting (or equivalent) in which CCEVS management officially accepts the product into evaluation.
After products are certified, NIAP puts currently valid certifications on its Product Compliant list. After 2 years, these certifications are reviewed for conformance with the current assurance maintenance policy. After the assurance maintenance date has expired, NIAP moves the certification listing to its Archived Products List.
The Common Criteria Portal lists certifications that can be mutually recognized under the Common Criteria Recognition Arrangement (CCRA). The CC Portal may maintain products on the certified product list for 5 years; records are kept by the CC Portal for archived certifications.
The table below shows the certifications that are currently being evaluated by a laboratory, or that have been certified as conforming with Common Criteria.
Current status
Evaluations with NIAP for macOS 11 and macOS 12 using the General Purpose Operating System and Full Disk Encryption (FDE) (AA and EE) Protection Profiles are under way.
For the latest information, see Products in evaluation (NIAP) and the Product Compliant List.
Operating system / Certification date | Scheme ID / Documents | Title / Protection Profiles |
|---|---|---|
Operating system: macOS 12 Monterey Certification date: — | Scheme ID: Not yet certified Documents: — | Title: Apple FileVault 2 with macOS 12 Monterey Protection Profiles: CPP_FDE_AA_V2.0E, CPP_FDE_EE_V2.0E (PPs to be confirmed) |
Operating system: macOS 12 Monterey Certification date: — | Scheme ID: Not yet certified Documents: — | Title: macOS 12 Monterey Protection Profiles: PP_OS_V4.21 (PPs to be confirmed) |
Operating system: macOS 11 Big Sur Certification date: — | Scheme ID: Not yet certified Documents: | Title: Apple FileVault 2 with macOS 11 Big Sur Protection Profiles: CPP_FDE_AA_V2.0E, CPP_FDE_EE_V2.0E |
Operating system: macOS 11 Big Sur Certification date: — | Scheme ID: Not yet certified Documents: | Title: Apple macOS 11 Big Sur Protection Profiles: PP_OS_V4.21 |
Operating system: macOS 10.15 Catalina Certification date: 2021-04-29 | Scheme ID: 11078 Documents: | Title: Apple FileVault 2 on T2 computers running macOS 10.15 Catalina Protection Profiles: CPP_FDE_AA_V2.0E, CPP_FDE_EE_V2.0E |
Operating system: macOS 10.15 Catalina Certification date: 2020-09-23 | Scheme ID: 11077 Documents: | Title: macOS 10.15 Catalina Protection Profiles: PP_OS_V4.21 |
For questions about Apple Security and Privacy Certifications, contact security-certifications@apple.com.