SELinux System Administration - Third Edition: Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2020.
|
Ausgabe: | 3rd ed. |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Description based upon print version of record. Using multilevel security on files. |
Beschreibung: | 1 online resource (459 p.) |
ISBN: | 9781800208537 1800208537 |
Internformat
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1224364058 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 201128s2020 xx o ||| 0 eng d | ||
040 | |a EBLCP |b eng |c EBLCP |d NLW |d YDX |d N$T |d UKMGB |d OCLCF |d OCLCO |d TEFOD |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
015 | |a GBC188982 |2 bnb | ||
016 | 7 | |a 020037395 |2 Uk | |
019 | |a 1252972802 |a 1391847857 | ||
020 | |a 9781800208537 | ||
020 | |a 1800208537 | ||
020 | |z 9781800201477 | ||
035 | |a (OCoLC)1224364058 |z (OCoLC)1252972802 |z (OCoLC)1391847857 | ||
037 | |a 9781800208537 |b Packt Publishing Pvt. Ltd | ||
037 | |a E5B3233B-203F-4724-9CD2-1482754043A4 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.774.L46 | |
082 | 7 | |a 005.432 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Vermeulen, Sven. | |
245 | 1 | 0 | |a SELinux System Administration - Third Edition |h [electronic resource] : |b Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
250 | |a 3rd ed. | ||
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2020. | ||
300 | |a 1 online resource (459 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles | |
505 | 8 | |a Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off | |
505 | 8 | |a Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why | |
505 | 8 | |a Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon | |
505 | 8 | |a Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories | |
500 | |a Using multilevel security on files. | ||
630 | 0 | 0 | |a Linux. |0 http://id.loc.gov/authorities/names/n94087892 |
630 | 0 | 7 | |a Linux |2 fast |
650 | 0 | |a Operating systems (Computers) |0 http://id.loc.gov/authorities/subjects/sh85094982 | |
650 | 6 | |a Systèmes d'exploitation (Ordinateurs) | |
650 | 7 | |a operating systems. |2 aat | |
650 | 7 | |a COMPUTERS |x System Administration |x Linux & UNIX Administration. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Operating Systems |x Linux. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Operating systems (Computers) |2 fast | |
758 | |i has work: |a SELinux System Administration - Third Edition (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXfVtxDKdPt9fw9BJ89T6q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Vermeulen, Sven |t SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux |d Birmingham : Packt Publishing, Limited,c2020 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2670812 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a YBP Library Services |b YANK |n 301732257 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6406419 | ||
938 | |a EBSCOhost |b EBSC |n 2670812 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1224364058 |
---|---|
_version_ | 1816882533937184769 |
adam_text | |
any_adam_object | |
author | Vermeulen, Sven |
author_facet | Vermeulen, Sven |
author_role | |
author_sort | Vermeulen, Sven |
author_variant | s v sv |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.774.L46 |
callnumber-search | QA76.774.L46 |
callnumber-sort | QA 276.774 L46 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories |
ctrlnum | (OCoLC)1224364058 |
dewey-full | 005.432 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.432 |
dewey-search | 005.432 |
dewey-sort | 15.432 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3rd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05677cam a2200637 4500</leader><controlfield tag="001">ZDB-4-EBA-on1224364058</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">201128s2020 xx o ||| 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="c">EBLCP</subfield><subfield code="d">NLW</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC188982</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020037395</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1252972802</subfield><subfield code="a">1391847857</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800208537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800208537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781800201477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1224364058</subfield><subfield code="z">(OCoLC)1252972802</subfield><subfield code="z">(OCoLC)1391847857</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781800208537</subfield><subfield code="b">Packt Publishing Pvt. Ltd</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">E5B3233B-203F-4724-9CD2-1482754043A4</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.774.L46</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.432</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vermeulen, Sven.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">SELinux System Administration - Third Edition</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (459 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Using multilevel security on files.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94087892</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85094982</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes d'exploitation (Ordinateurs)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">operating systems.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">System Administration</subfield><subfield code="x">Linux & UNIX Administration.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">Linux.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Operating systems (Computers)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">SELinux System Administration - Third Edition (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXfVtxDKdPt9fw9BJ89T6q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Vermeulen, Sven</subfield><subfield code="t">SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2020</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2670812</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301732257</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6406419</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2670812</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1224364058 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:08Z |
institution | BVB |
isbn | 9781800208537 1800208537 |
language | English |
oclc_num | 1224364058 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (459 p.) |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Vermeulen, Sven. SELinux System Administration - Third Edition [electronic resource] : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. 3rd ed. Birmingham : Packt Publishing, Limited, 2020. 1 online resource (459 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based upon print version of record. Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories Using multilevel security on files. Linux. http://id.loc.gov/authorities/names/n94087892 Linux fast Operating systems (Computers) http://id.loc.gov/authorities/subjects/sh85094982 Systèmes d'exploitation (Ordinateurs) operating systems. aat COMPUTERS System Administration Linux & UNIX Administration. bisacsh COMPUTERS Operating Systems Linux. bisacsh COMPUTERS Security General. bisacsh Operating systems (Computers) fast has work: SELinux System Administration - Third Edition (Text) https://id.oclc.org/worldcat/entity/E39PCXfVtxDKdPt9fw9BJ89T6q https://id.oclc.org/worldcat/ontology/hasWork Print version: Vermeulen, Sven SELinux System Administration - Third Edition : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux Birmingham : Packt Publishing, Limited,c2020 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2670812 Volltext |
spellingShingle | Vermeulen, Sven SELinux System Administration - Third Edition Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Using SELinux -- Chapter 1: Fundamental SELinux Concepts -- Technical requirements -- Providing more security for Linux -- Introducing Linux Security Modules (LSM) -- Extending regular DAC with SELinux -- Restricting root privileges -- Reducing the impact of vulnerabilities -- Enabling SELinux support -- Labeling all resources and objects -- Dissecting the SELinux context -- Enforcing access through types -- Granting domain access through roles Limiting roles through users -- Controlling information flow through sensitivities -- Defining and distributing policies -- Writing SELinux policies -- Distributing policies through modules -- Bundling modules in a policy store -- Distinguishing between policies -- Supporting MLS -- Dealing with unknown permissions -- Supporting unconfined domains -- Limiting cross-user sharing -- Incrementing policy versions -- Different policy content -- Summary -- Questions -- Chapter 2: Understanding SELinux Decisions and Logging -- Technical requirements -- Switching SELinux on and off Setting the global SELinux state -- Switching to permissive or enforcing mode -- Using kernel boot parameters -- Disabling SELinux protections for a single service -- Understanding SELinux-aware applications -- SELinux logging and auditing -- Following audit events -- Tuning the AVC -- Uncovering more logging -- Configuring Linux auditing -- Configuring the local system logger -- Reading SELinux denials -- Other SELinux-related event types -- Using ausearch -- Getting help with denials -- Troubleshooting with setroubleshoot -- Sending emails when SELinux denials occur -- Using audit2why Interacting with systemd-journal -- Using common sense -- Summary -- Questions -- Chapter 3: Managing User Logins -- Technical requirements -- User-oriented SELinux contexts -- SELinux users and roles -- Listing SELinux user mappings -- Mapping logins to SELinux users -- Customizing logins for services -- Creating SELinux users -- Listing accessible domains -- Managing categories -- Handling SELinux roles -- Defining allowed SELinux contexts -- Validating contexts with getseuser -- Switching roles with newrole -- Managing role access through sudo -- Reaching other domains using runcon Switching to the system role -- SELinux and PAM -- Assigning contexts through PAM -- Prohibiting access during permissive mode -- Polyinstantiating directories -- Summary -- Questions -- Chapter 4: Using File Contexts and Process Domains -- Technical requirements -- Introduction to SELinux file contexts -- Getting context information -- Interpreting SELinux context types -- Keeping or ignoring contexts -- Inheriting the default contexts -- Querying transition rules -- Copying and moving files -- Temporarily changing file contexts -- Placing categories on files and directories Linux. http://id.loc.gov/authorities/names/n94087892 Linux fast Operating systems (Computers) http://id.loc.gov/authorities/subjects/sh85094982 Systèmes d'exploitation (Ordinateurs) operating systems. aat COMPUTERS System Administration Linux & UNIX Administration. bisacsh COMPUTERS Operating Systems Linux. bisacsh COMPUTERS Security General. bisacsh Operating systems (Computers) fast |
subject_GND | http://id.loc.gov/authorities/names/n94087892 http://id.loc.gov/authorities/subjects/sh85094982 |
title | SELinux System Administration - Third Edition Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
title_auth | SELinux System Administration - Third Edition Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
title_exact_search | SELinux System Administration - Third Edition Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
title_full | SELinux System Administration - Third Edition [electronic resource] : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
title_fullStr | SELinux System Administration - Third Edition [electronic resource] : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
title_full_unstemmed | SELinux System Administration - Third Edition [electronic resource] : Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
title_short | SELinux System Administration - Third Edition |
title_sort | selinux system administration third edition implement mandatory access control to secure applications users and information flows on linux |
title_sub | Implement Mandatory Access Control to Secure Applications, Users, and Information Flows on Linux. |
topic | Linux. http://id.loc.gov/authorities/names/n94087892 Linux fast Operating systems (Computers) http://id.loc.gov/authorities/subjects/sh85094982 Systèmes d'exploitation (Ordinateurs) operating systems. aat COMPUTERS System Administration Linux & UNIX Administration. bisacsh COMPUTERS Operating Systems Linux. bisacsh COMPUTERS Security General. bisacsh Operating systems (Computers) fast |
topic_facet | Linux. Linux Operating systems (Computers) Systèmes d'exploitation (Ordinateurs) operating systems. COMPUTERS System Administration Linux & UNIX Administration. COMPUTERS Operating Systems Linux. COMPUTERS Security General. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2670812 |
work_keys_str_mv | AT vermeulensven selinuxsystemadministrationthirdeditionimplementmandatoryaccesscontroltosecureapplicationsusersandinformationflowsonlinux |