Chapter 11. Original Example Policy

In this chapter

• 11.1 Methods for Managing the Build Process

• 11.2 Strict Example Policy

• 11.3 Targeted Example Policy

• 11.4 Summary

• Exercises

The job of taking all the elements of an SELinux policy and composing a complete and comprehensive security policy that meets all your security goals can be difficult if you work with just the raw policy language described in Part II. In this chapter, we discuss one of the two principal methods (derived from the original National Security Agency [NSA] example policy) that have evolved the past several years to allow policy developers to manage the policy build process.

11.1 Methods for Managing the Build Process

If you have read through Part II, by now you might ...

Get SELinux by Example: Using Security Enhanced Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.