SELinux by Example: Using Security Enhanced Linux

In this chapter

  • 11.1 Methods for Managing the Build Process

  • 11.2 Strict Example Policy

  • 11.3 Targeted Example Policy

  • 11.4 Summary

  • Exercises

page 240

page 242

page 261

page 262

page 263

The job of taking all the elements of an SELinux policy and composing a complete and comprehensive security policy that meets all your security goals can be difficult if you work with just the raw policy language described in Part II. In this chapter, we discuss one of the two principal methods (derived from the original National Security Agency [NSA] example policy) that have evolved the past several years to allow policy developers to manage the policy build process.

Категории