Linux Security

  1. Mandatory Access Control (MAC) Frameworks
    1. SELinux (Security-Enhanced Linux)
      1. Core Concepts
        1. Subjects and Objects
          1. Security Contexts
            1. Type Enforcement
              1. Multi-Level Security
                1. Multi-Category Security
                2. Security Context Components
                  1. User Component
                    1. Role Component
                      1. Type Component
                        1. Level Component
                        2. Policy Types
                          1. Targeted Policy
                            1. MLS Policy
                              1. Minimum Policy
                                1. Custom Policies
                                2. SELinux Modes
                                  1. Enforcing Mode
                                    1. Permissive Mode
                                      1. Disabled Mode
                                        1. Mode Transitions
                                        2. Context Management
                                          1. Viewing Contexts
                                            1. Changing Contexts
                                              1. Restoring Contexts
                                                1. Context Inheritance
                                                2. Boolean Management
                                                  1. SELinux Booleans
                                                    1. Viewing Booleans
                                                      1. Setting Booleans
                                                        1. Persistent Changes
                                                        2. Policy Management
                                                          1. Policy Modules
                                                            1. Loading Policies
                                                              1. Policy Compilation
                                                                1. Custom Policy Development
                                                                2. Troubleshooting SELinux
                                                                  1. Audit Log Analysis
                                                                    1. ausearch Usage
                                                                      1. sealert Usage
                                                                        1. Common Denial Resolution
                                                                          1. Performance Impact
                                                                        2. AppArmor
                                                                          1. Core Concepts
                                                                            1. Profiles
                                                                              1. Path-based Access Control
                                                                                1. Capabilities
                                                                                  1. Network Access Control
                                                                                  2. Profile Types
                                                                                    1. Enforce Mode
                                                                                      1. Complain Mode
                                                                                        1. Unconfined Mode
                                                                                        2. Profile Management
                                                                                          1. Profile Status
                                                                                            1. Mode Changes
                                                                                              1. Profile Loading
                                                                                                1. Profile Unloading
                                                                                                2. Profile Development
                                                                                                  1. aa-genprof Usage
                                                                                                    1. aa-logprof Usage
                                                                                                      1. Manual Profile Creation
                                                                                                        1. Profile Testing
                                                                                                        2. AppArmor Tools
                                                                                                          1. aa-status Command
                                                                                                            1. aa-enforce Command
                                                                                                              1. aa-complain Command
                                                                                                                1. aa-disable Command
                                                                                                              2. Comparison of MAC Systems
                                                                                                                1. SELinux vs AppArmor
                                                                                                                  1. Performance Considerations
                                                                                                                    1. Ease of Management
                                                                                                                      1. Policy Flexibility