SELinux System Administration - Second Edition

Ward off traditional security permissions and effectively secure your Linux systems with SELinux

SELinux System Administration - Second Edition

Learning
Sven Vermeulen

Ward off traditional security permissions and effectively secure your Linux systems with SELinux
$39.99
$49.99
RRP $39.99
RRP $49.99
eBook
Print + eBook

Instantly access this course right now and get the skills you need in 2017

With unlimited access to a constantly growing library of over 4,000 eBooks and Videos, a subscription to Mapt gives you everything you need to learn new skills. Cancel anytime.

Code Files
Free Sample

Book Details

ISBN 139781787126954
Paperback300 pages

Book Description

Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system’s secure state across Linux distributions, helping you keep application vulnerabilities at bay.

This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux’s configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux.

By the end of the book you will know how SELinux works and how you can tune it to meet your needs.

Table of Contents

Chapter 1: Fundamental SELinux Concepts
Providing more security to Linux
Labeling all resources and objects
Defining and distributing policies
Distinguishing between policies
Summary
Chapter 2: Understanding SELinux Decisions and Logging
Switching SELinux on and off
SELinux logging and auditing
Getting help with denials
Summary
Chapter 3: Managing User Logins
User-oriented SELinux contexts
SELinux users and roles
Handling SELinux roles
SELinux and PAM
Summary
Chapter 4: Process Domains and File-Level Access Controls
About SELinux file contexts
Keeping or ignoring contexts
SELinux file context expressions
Modifying file contexts
The context of a process
Limiting the scope of transitions
Types, permissions, and constraints
Summary
Chapter 5: Controlling Network Communications
From IPC to TCP and UDP sockets
Linux netfilter and SECMARK support
Labeled networking
Labeled IPsec
NetLabel/CIPSO
Summary
Chapter 6: sVirt and Docker Support
SELinux-secured virtualization
libvirt SELinux support
Securing Docker containers
Summary
Chapter 7: D-Bus and systemd
The system daemon (systemd)
Service support in systemd
Logging with systemd
Using systemd containers
Handling device files
D-Bus communication
Summary
Chapter 8: Working with SELinux Policies
SELinux booleans
Enhancing SELinux policies
Creating custom modules
Creating roles and user domains
Creating new application domains
Replacing existing policies
Other uses of policy enhancements
Summary
Chapter 9: Analyzing Policy Behavior
Single-step analysis
Domain transition analysis
Information flow analysis
Other policy analysis
Summary
Chapter 10: SELinux Use Cases
Hardening web servers
Securing shell services
File sharing through NFS
Summary

What You Will Learn

  • Analyze SELinux events and selectively enable or disable SELinux enforcement
  • Manage Linux users and associate them with the right role and permission set
  • Secure network communications through SELinux access controls
  • Tune the full service flexibility by dynamically assigning resource labels 
  • Handle SELinux access patterns enforced through the system
  • Query the SELinux policy in depth

Authors

Table of Contents

Chapter 1: Fundamental SELinux Concepts
Providing more security to Linux
Labeling all resources and objects
Defining and distributing policies
Distinguishing between policies
Summary
Chapter 2: Understanding SELinux Decisions and Logging
Switching SELinux on and off
SELinux logging and auditing
Getting help with denials
Summary
Chapter 3: Managing User Logins
User-oriented SELinux contexts
SELinux users and roles
Handling SELinux roles
SELinux and PAM
Summary
Chapter 4: Process Domains and File-Level Access Controls
About SELinux file contexts
Keeping or ignoring contexts
SELinux file context expressions
Modifying file contexts
The context of a process
Limiting the scope of transitions
Types, permissions, and constraints
Summary
Chapter 5: Controlling Network Communications
From IPC to TCP and UDP sockets
Linux netfilter and SECMARK support
Labeled networking
Labeled IPsec
NetLabel/CIPSO
Summary
Chapter 6: sVirt and Docker Support
SELinux-secured virtualization
libvirt SELinux support
Securing Docker containers
Summary
Chapter 7: D-Bus and systemd
The system daemon (systemd)
Service support in systemd
Logging with systemd
Using systemd containers
Handling device files
D-Bus communication
Summary
Chapter 8: Working with SELinux Policies
SELinux booleans
Enhancing SELinux policies
Creating custom modules
Creating roles and user domains
Creating new application domains
Replacing existing policies
Other uses of policy enhancements
Summary
Chapter 9: Analyzing Policy Behavior
Single-step analysis
Domain transition analysis
Information flow analysis
Other policy analysis
Summary
Chapter 10: SELinux Use Cases
Hardening web servers
Securing shell services
File sharing through NFS
Summary

Book Details

ISBN 139781787126954
Paperback300 pages
Read More

Read More Reviews