Paranoid Penguin - Introduction to SELinux
Besides Type Enforcement, SELinux includes a second model, called Role-Based Access Control (RBAC). Although I'm out of space for now, RBAC builds on the concepts we've already discussed, providing controls especially useful when real human users, as opposed to dæmons and other automated processes, are concerned.
Next time, I'll describe RBAC at length and begin going into greater depth on how actually to use SELinux, beginning with Fedora and Red Hat's “targeted” policy. Until then, be safe!
Resources for this article: /article/9510.
Mick Bauer (email@example.com) is Network Security Architect for one of the US's largest banks. He is the author of the O'Reilly book Linux Server Security, 2nd edition (formerly called Building Secure Servers With Linux), an occasional presenter at information security conferences and composer of the “Network Engineering Polka”.
- why is GNOME 3 in the fifth position at 14.1 %?
1 hour 13 min ago
- Sublime Is Brilliant!
6 hours 16 min ago
6 hours 35 min ago
- Rapid[Disk,Cache] better than native ram caching?
7 hours 26 sec ago
- Nothing is perfect
7 hours 13 min ago
- Mixtapes Community
12 hours 52 min ago
- KDE is one true DE
13 hours 27 min ago
- Command Line Shells (Bash, Zsh, etc.) are 2nd place
13 hours 55 min ago
15 hours 50 min ago
- yes it's Jupiter Broadcasting
17 hours 9 min ago