July 2006
Intermediate to advanced
456 pages
9h 45m
English
In this chapter
• 11.1 Methods for Managing the Build Process
• 11.3 Targeted Example Policy
The job of taking all the elements of an SELinux policy and composing a complete and comprehensive security policy that meets all your security goals can be difficult if you work with just the raw policy language described in Part II. In this chapter, we discuss one of the two principal methods (derived from the original National Security Agency [NSA] example policy) that have evolved the past several years to allow policy developers to manage the policy build process.
If you have read through Part II, by now you might ...