Books & Videos

Table of Contents

  1. Chapter 1 Introducing SELinux

    1. Software Threats and the Internet

    2. SELinux Features

    3. Applications of SELinux

    4. SELinux History

    5. Web and FTP Sites

  2. Chapter 2 Overview of the SELinux Security Model

    1. Subjects and Objects

    2. Security Contexts

    3. Transient and Persistent Objects

    4. Access Decisions

    5. Transition Decisions

    6. SELinux Architecture

  3. Chapter 3 Installing and Initially Configuring SELinux

    1. SELinux Versions

    2. Installing SELinux

    3. Linux Distributions Supporting SELinux

    4. Installation Overview

    5. Installing SELinux from Binary or Source Packages

    6. Installing from Source

  4. Chapter 4 Using and Administering SELinux

    1. System Modes and SELinux Tuning

    2. Controlling SELinux

    3. Routine SELinux System Use and Administration

    4. Monitoring SELinux

    5. Troubleshooting SELinux

  5. Chapter 5 SELinux Policy and Policy Language Overview

    1. The SELinux Policy

    2. Two Forms of an SELinux Policy

    3. Anatomy of a Simple SELinux Policy Domain

    4. SELinux Policy Structure

  6. Chapter 6 Role-Based Access Control

    1. The SELinux Role-Based Access Control Model

    2. Railroad Diagrams

    3. SELinux Policy Syntax

    4. User Declarations

    5. Role-Based Access Control Declarations

  7. Chapter 7 Type Enforcement

    1. The SELinux Type-Enforcement Model

    2. Review of SELinux Policy Syntax

    3. Type-Enforcement Declarations

    4. Examining a Sample Policy

  8. Chapter 8 Ancillary Policy Statements

    1. Constraint Declarations

    2. Other Context-Related Declarations

    3. Flask-Related Declarations

  9. Chapter 9 Customizing SELinux Policies

    1. The SELinux Policy Source Tree

    2. On the Topics of Difficulty and Discretion

    3. Using the SELinux Makefile

    4. Creating an SELinux User

    5. Customizing Roles

    6. Adding Permissions

    7. Allowing a User Access to an Existing Domain

    8. Creating a New Domain

    9. Using Audit2allow

    10. Policy Management Tools

    11. The Road Ahead

  1. Appendix Security Object Classes

  2. Appendix SELinux Operations

  3. Appendix SELinux Macros Defined in src/policy/macros

  4. Appendix SELinux General Types

  5. Appendix SELinux Type Attributes

  6. Colophon