SELinux NSA’s Open Source Security Enhanced Linux Free PDF

 

SELinux NSA’s Open Source Security Enhanced Linux Free PDF

SELinux NSA's Open Source Security Enhanced Linux Free PDF

SELinux NSA’s Open Source Security Enhanced Linux Free PDF

About:

SELinux
By Bill McCarty
Publisher : O’Reilly
Pub Date : October 2004
ISBN : 0-596-00716-7
Pages : 254

Description:

The concentrated quest for a more secure working framework has frequently left ordinary, generation PCs a long ways behind their test, research cousins. Presently SELinux (Security Enhanced Linux) significantly transforms this. This best-known and most regarded security-related augmentation to Linux exemplifies the key advances of the security field. Even better, SELinux is accessible in far reaching and well known circulations of the Linux working framework – including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE- – every last bit of it free and open source. SELinux rose up out of examination by the National Security Agency and executes great solid efforts to establish safety, for example, part based access controls, compulsory access controls, and fine-grained moves and benefit acceleration taking after the rule of minimum benefit. It makes up for the unavoidable cradle floods and different shortcomings in applications by separating them and keeping imperfections in one application from spreading to others. The situations that cause the most digital harm nowadays – when somebody gets a toe-hang on a PC through a helplessness in a nearby arranged application, for example, a Web server, and parlays that toe-hold into pervasive control over the PC framework – are averted on an appropriately managed SELinux system.The key, obviously, lies in the words “legitimately directed.” A framework executive for SELinux needs an extensive variety of information, for example, the standards behind the framework, how to relegate diverse benefits to various gatherings of clients, how to change strategies to suit new programming, and how to log and track what is going on. What’s more, this is the place SELinux is important. Writer Bill McCarty, a security specialist who has advised various government offices, joins his concentrated examination into SELinux into this little however data stuffed book. Themes include:

  • A clear and solid clarification of SELinux ideas and the SELinux security model
  • Establishment directions for various appropriations
  • Essential framework and client organization
  • An itemized dismemberment of the SELinux approach dialect
  • Cases and rules for changing and including approaches

With SELinux, a high-security PC is inside scope of any framework manager. In the event that you need a compelling method for securing your Linux framework – and who doesn’t?- – this book gives the methods.

Content:

  1. Chapter 1 Introducing SELinux
    1. Software Threats and the Internet
    2. SELinux Features
    3. Applications of SELinux
    4. SELinux History
    5. Web and FTP Sites
  2. Chapter 2 Overview of the SELinux Security Model
    1. Subjects and Objects
    2. Security Contexts
    3. Transient and Persistent Objects
    4. Access Decisions
    5. Transition Decisions
    6. SELinux Architecture
  3. Chapter 3 Installing and Initially Configuring SELinux
    1. SELinux Versions
    2. Installing SELinux
    3. Linux Distributions Supporting SELinux
    4. Installation Overview
    5. Installing SELinux from Binary or Source Packages
    6. Installing from Source
  4. Chapter 4 Using and Administering SELinux
    1. System Modes and SELinux Tuning
    2. Controlling SELinux
    3. Routine SELinux System Use and Administration
    4. Monitoring SELinux
    5. Troubleshooting SELinux
  5. Chapter 5 SELinux Policy and Policy Language Overview
    1. The SELinux Policy
    2. Two Forms of an SELinux Policy
    3. Anatomy of a Simple SELinux Policy Domain
    4. SELinux Policy Structure
  6. Chapter 6 Role-Based Access Control
    1. The SELinux Role-Based Access Control Model
    2. Railroad Diagrams
    3. SELinux Policy Syntax
    4. User Declarations
    5. Role-Based Access Control Declarations
  7. Chapter 7 Type Enforcement
    1. The SELinux Type-Enforcement Model
    2. Review of SELinux Policy Syntax
    3. Type-Enforcement Declarations
    4. Examining a Sample Policy
  8. Chapter 8 Ancillary Policy Statements
    1. Constraint Declarations
    2. Other Context-Related Declarations
    3. Flask-Related Declarations
  9. Chapter 9 Customizing SELinux Policies
    1. The SELinux Policy Source Tree
    2. On the Topics of Difficulty and Discretion
    3. Using the SELinux Makefile
    4. Creating an SELinux User
    5. Customizing Roles
    6. Adding Permissions
    7. Allowing a User Access to an Existing Domain
    8. Creating a New Domain
    9. Using Audit2allow
    10. Policy Management Tools
    11. The Road Ahead

SELinux NSA’s Open Source Security Enhanced Linux Free PDF

SELinux NSA’s Open Source Security Enhanced Linux Free PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

*