O'Reilly logo

SELinux by Example: Using Security Enhanced Linux by David Caplan, Karl MacMillan, Frank Mayer

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Writing Policy Modules

In this chapter

• 14.1 Overview of Writing a Policy Module

• 14.2 Preparation and Planning

• 14.3 Creating an Initial Policy Module

• 14.4 Testing and Analyzing the Policy

• 14.5 Emerging Policy Development Tools

• 14.6 Complete IRC Daemon Module Listings

• 14.7 Summary

This chapter brings together all we have learned throughout the book. It presents a guided tour of writing a policy module for both the example and reference policies.

14.1 Overview of Writing a Policy Module

In this chapter, we walk through the process of creating a policy module, bringing together all we have learned throughout the book. We discuss all the steps required to create a policy module for both the original example policy (Chapter ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required