O'Reilly logo

SELinux by Example: Using Security Enhanced Linux by David Caplan, Karl MacMillan, Frank Mayer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Original Example Policy

In this chapter

• 11.1 Methods for Managing the Build Process

• 11.2 Strict Example Policy

• 11.3 Targeted Example Policy

• 11.4 Summary

• Exercises

The job of taking all the elements of an SELinux policy and composing a complete and comprehensive security policy that meets all your security goals can be difficult if you work with just the raw policy language described in Part II. In this chapter, we discuss one of the two principal methods (derived from the original National Security Agency [NSA] example policy) that have evolved the past several years to allow policy developers to manage the policy build process.

11.1 Methods for Managing the Build Process

If you have read through Part II, by now you might ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required