Understanding and Configuring SELinux
Topics covered in this chapter:
- Understanding SELinux
- Selecting the SELinux Mode
- Working with SELinux Context Types
- Configuring SELinux Policies
- Working with SELinux Modules
- Setting up SELinux with system-config-selinux
- Troubleshooting SELinux
To keep a server really secure, you'll need to make sure that services are monitored and limited in what they can do. That is what SELinux is used for. In this chapter you'll read how to manage SELinux to add more security to your server and limit the chances of security incidents happening.
Permissions are the foundation of all security on your Red Hat Enterprise Linux server. Just using permissions, however, isn't sufficient if you ...