Skip to Content
SELinux by Example: Using Security Enhanced Linux
book

SELinux by Example: Using Security Enhanced Linux

by Frank Mayer, Karl MacMillan, David Caplan
July 2006
Intermediate to advanced content levelIntermediate to advanced
456 pages
9h 45m
English
Pearson
Content preview from SELinux by Example: Using Security Enhanced Linux

Chapter 11. Original Example Policy

In this chapter

• 11.1 Methods for Managing the Build Process

• 11.2 Strict Example Policy

• 11.3 Targeted Example Policy

• 11.4 Summary

• Exercises

The job of taking all the elements of an SELinux policy and composing a complete and comprehensive security policy that meets all your security goals can be difficult if you work with just the raw policy language described in Part II. In this chapter, we discuss one of the two principal methods (derived from the original National Security Agency [NSA] example policy) that have evolved the past several years to allow policy developers to manage the policy build process.

11.1 Methods for Managing the Build Process

If you have read through Part II, by now you might ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security Internals

Android Security Internals

Nikolay Elenkov
SELinux Cookbook

SELinux Cookbook

Sven Vermeulen
CentOS Quick Start Guide

CentOS Quick Start Guide

Shiwang Kalkhanda
Security Superstream: Ransomware

Security Superstream: Ransomware

Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono

Publisher Resources

ISBN: 0131963694Purchase book