官术网_书友最值得收藏!

Summary

In this chapter, we saw that SELinux offers a more fine-grained access control mechanism on top of the Linux access control. SELinux uses labels to identify its resources and processes, based on ownership (user), role, type, and even the security sensitivity and categorization of the resource.

Linux distributions implement SELinux policies which might be a bit different from each other based on supporting features such as sensitivity labels, default behavior for unknown permissions, support for confinement levels, or specific constraints put in place, for example, UBAC. However, most of the policy rules themselves are similar.

Switching between SELinux enforcement modes and understanding the log events that SELinux creates when it prohibits a certain access, is the subject of our next chapter. In it, we will also cover how to approach the often-heard requirement of disabling SELinux and why this is the wrong solution to implement.

主站蜘蛛池模板: 固始县| 青神县| 界首市| 凤山县| 德昌县| 北海市| 桂东县| 峡江县| 肃宁县| 马边| 金川县| 通渭县| 蓬安县| 海城市| 贞丰县| 稷山县| 邵东县| 托克托县| 雅安市| 阿克陶县| 吉安县| 郁南县| 民和| 乳山市| 彭阳县| 河津市| 大石桥市| 随州市| 楚雄市| 察隅县| 通州区| 根河市| 大同县| 新民市| 湖州市| 都昌县| 七台河市| 竹山县| 荆州市| 军事| 朔州市|