SELinux System Administration - Second Edition

Ward off traditional security permissions and effectively secure your Linux systems with SELinux

SELinux System Administration - Second Edition

Sven Vermeulen

5 customer reviews
Ward off traditional security permissions and effectively secure your Linux systems with SELinux
Mapt Subscription
FREE
$29.99/m after trial
eBook
$28.00
RRP $39.99
Print + eBook
$49.99
RRP $49.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$28.00
$49.99
$29.99p/m after trial
RRP $39.99
RRP $49.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781787126954
Paperback300 pages

Book Description

Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system’s secure state across Linux distributions, helping you keep application vulnerabilities at bay.

This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux’s configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux.

By the end of the book you will know how SELinux works and how you can tune it to meet your needs.

Table of Contents

Chapter 1: Fundamental SELinux Concepts
Providing more security to Linux
Labeling all resources and objects
Defining and distributing policies
Distinguishing between policies
Summary
Chapter 2: Understanding SELinux Decisions and Logging
Switching SELinux on and off
SELinux logging and auditing
Getting help with denials
Summary
Chapter 3: Managing User Logins
User-oriented SELinux contexts
SELinux users and roles
Handling SELinux roles
SELinux and PAM
Summary
Chapter 4: Process Domains and File-Level Access Controls
About SELinux file contexts
Keeping or ignoring contexts
SELinux file context expressions
Modifying file contexts
The context of a process
Limiting the scope of transitions
Types, permissions, and constraints
Summary
Chapter 5: Controlling Network Communications
From IPC to TCP and UDP sockets
Linux netfilter and SECMARK support
Labeled networking
Labeled IPsec
NetLabel/CIPSO
Summary
Chapter 6: sVirt and Docker Support
SELinux-secured virtualization
libvirt SELinux support
Securing Docker containers
Summary
Chapter 7: D-Bus and systemd
The system daemon (systemd)
Service support in systemd
Logging with systemd
Using systemd containers
Handling device files
D-Bus communication
Summary
Chapter 8: Working with SELinux Policies
SELinux booleans
Enhancing SELinux policies
Creating custom modules
Creating roles and user domains
Creating new application domains
Replacing existing policies
Other uses of policy enhancements
Summary
Chapter 9: Analyzing Policy Behavior
Single-step analysis
Domain transition analysis
Information flow analysis
Other policy analysis
Summary
Chapter 10: SELinux Use Cases
Hardening web servers
Securing shell services
File sharing through NFS
Summary

What You Will Learn

  • Analyze SELinux events and selectively enable or disable SELinux enforcement
  • Manage Linux users and associate them with the right role and permission set
  • Secure network communications through SELinux access controls
  • Tune the full service flexibility by dynamically assigning resource labels 
  • Handle SELinux access patterns enforced through the system
  • Query the SELinux policy in depth

Authors

Table of Contents

Chapter 1: Fundamental SELinux Concepts
Providing more security to Linux
Labeling all resources and objects
Defining and distributing policies
Distinguishing between policies
Summary
Chapter 2: Understanding SELinux Decisions and Logging
Switching SELinux on and off
SELinux logging and auditing
Getting help with denials
Summary
Chapter 3: Managing User Logins
User-oriented SELinux contexts
SELinux users and roles
Handling SELinux roles
SELinux and PAM
Summary
Chapter 4: Process Domains and File-Level Access Controls
About SELinux file contexts
Keeping or ignoring contexts
SELinux file context expressions
Modifying file contexts
The context of a process
Limiting the scope of transitions
Types, permissions, and constraints
Summary
Chapter 5: Controlling Network Communications
From IPC to TCP and UDP sockets
Linux netfilter and SECMARK support
Labeled networking
Labeled IPsec
NetLabel/CIPSO
Summary
Chapter 6: sVirt and Docker Support
SELinux-secured virtualization
libvirt SELinux support
Securing Docker containers
Summary
Chapter 7: D-Bus and systemd
The system daemon (systemd)
Service support in systemd
Logging with systemd
Using systemd containers
Handling device files
D-Bus communication
Summary
Chapter 8: Working with SELinux Policies
SELinux booleans
Enhancing SELinux policies
Creating custom modules
Creating roles and user domains
Creating new application domains
Replacing existing policies
Other uses of policy enhancements
Summary
Chapter 9: Analyzing Policy Behavior
Single-step analysis
Domain transition analysis
Information flow analysis
Other policy analysis
Summary
Chapter 10: SELinux Use Cases
Hardening web servers
Securing shell services
File sharing through NFS
Summary

Book Details

ISBN 139781787126954
Paperback300 pages
Read More
From 5 reviews

Read More Reviews