SELinux by Example: Using Security Enhanced Linux

In this chapter

  • 5.1 Type Enforcement

  • 5.2 Types, Attributes, and Aliases

  • 5.3 Access Vector Rules

  • 5.4 Type Rules

  • 5.5 Exploring Type Enforcement Rules with Apol

  • 5.6 Summary

  • Exercises

page 90

page 91

page 100

page 115

page 122

page 127

page 128

The majority of a SELinux policy is made up of several rules that together we call the type enforcement rules. These rules control allowed access, many aspects of default transition labeling, auditing, and invariant assertion checking. In this chapter, we examine the type enforcement rules in detail along with the statements to define and declare the types used by these rules.

Категории