Security Enhanced Linux (SELinux)

Introduction

SELinux stands for?Security?Enhanced?Linux, which is an additional layer of system security. The primary goal of SELinux is to protect user data from system services that have been compromised.

For example, If you use SSH for remote login, then you can access the whole system and resources with the standard user/group/other permission security model which known as discretionary access control. SELinux provides an additional layer of security that is object-based, known as mandatory access control. So if you login, you only have a specific domain to access with sophisticated rules.

SELinux is a set of security rules that determine which process can access which files, directories, and ports. Every file, process, directory, and port has a special security label called an SELinux context. A context is a name used by the SELinux policy to determine whether a process can access a file, directory, or port. By default, the policy does not allow any interaction unless an explicit rule grants access. If there is no allow rule, no access is allowed.

How to enable SELinux?

SELinux has three modes:

  1. Disabled: it's the offline mode, and we refer to it as 0.
  2. Permissive: it's working in the background and giving only alerts and logs without interfering.
  3. Enabled: When it's active, and we refer to this mode as 1 or “Enforcing”.

To know the current SELinux mode:

[user@host ~]# getenforce

To set different mode, enter "setenforce 0" to disable it and "setenforce 1" or "setenforce Enforcing" to enable:

[user@host ~]# setenforce 1

then reboot.

要查看或添加评论,请登录

Yusuf Amr的更多文章

  • What is OAuth? And how it works?

    What is OAuth? And how it works?

    OAuth is a delegated authorization, stands for open standard for access delegation, commonly used to enable apps to…

  • Advanced Static Malware Analysis

    Advanced Static Malware Analysis

    I would like to share some of my notes of the advanced static malware analysis from what I learned from PMAT (Practical…

    1 条评论
  • Basic Static Malware Analysis

    Basic Static Malware Analysis

    I would like to share some of my notes of how to do basic static malware analysis from what I learned from PMAT…

  • SIEM solutions in AWS

    SIEM solutions in AWS

    If you have a cloud infrastructure on Amazon Web Services (AWS) and you need a security information and event…

  • Amazon GuardDuty

    Amazon GuardDuty

    Amazon GuardDuty is a managed cloud security monitoring service that detects behavior or threats that can compromise…

  • Implementing S3

    Implementing S3

    I met IT engineers of a popular hotel in Egypt that totally depends on the traditional network. We talked about many…

  • AWS Edge Security

    AWS Edge Security

    Security at AWS starts with core infrastructure and out to customer edge devices and endpoints. The AWS global network…

  • An overview of AWS Identity and Access Management (IAM)

    An overview of AWS Identity and Access Management (IAM)

    Identity and Access Management (IAM) is one of the essential services in Amazon Web Services (AWS) and also can be…

社区洞察

其他会员也浏览了