![]() SELinux works to limit privileges or remove the risks associated with compromising a program or daemon.īefore starting, you should know that SELinux is mainly intended for RHEL distributions, although it is possible to implement it on other distributions like Debian (but good luck!). If, throughout your career, you have either disabled or ignored SELinux, this document will be a good introduction to this system. This system is called SELinux ( Security Enhanced Linux) and was created by the NSA ( National Security Agency) to implement a robust Mandatory Access Control ( MAC) architecture in the Linux kernel subsystems. With the arrival of kernel version 2.6, a new security system was introduced to provide a security mechanism to support access control security policies. ![]() NoSleep.sh - A simple Configuration Script Verifying DISA STIG Compliance with OpenSCAP - Part 2 ![]() Memverifikasi Kepatuhan DISA STIG dengan OpenSCAP - Bagian 2 Host-based Intrustion Detection System (HIDS)īash - Conditional structures if and case ![]() The SELinux context of important processes The SELinux context of standard processes Building and Installing Custom Linux KernelsĪutomatic Template Creation - Packer - Ansible - VMware vSphere ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |