Chapter 11. Original Example Policy


In this chapter

  • 11.1 Methods for Managing the Build Process

  • 11.2 Strict Example Policy

  • 11.3 Targeted Example Policy

  • 11.4 Summary

  • Exercises

page 240

page 242

page 261

page 262

page 263


The job of taking all the elements of an SELinux policy and composing a complete and comprehensive security policy that meets all your security goals can be difficult if you work with just the raw policy language described in Part II. In this chapter, we discuss one of the two principal methods (derived from the original National Security Agency [NSA] example policy) that have evolved the past several years to allow policy developers to manage the policy build process.




SELinux by Example(c) Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux
ISBN: 0131963694
EAN: 2147483647
Year: 2007
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net