Section 20.195 SELinux Policies Flashcards

Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

SELinux and MAC Basics

SELinux (Security Enhanced Linux)

A

● A security mechanism that provides an additional layer of security for
Linux distributions

● Enforces Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SELinux and MAC Basics

Mandatory Access Control (MAC)

A

Restricts access to system resources based on subject clearance and
object labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SELinux and MAC Basics

Context-based permissions

A

Permission schemes that consider various properties to determine
whether to grant or deny access to a user

■ Two main context-based permission schemes in Linux that use MAC:

● SELinux
● AppArmor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SELinux and MAC Basics

DAC vs. MAC

A

DAC (Discretionary Access Control):

○ Each object has a list of entities that are allowed to access it
○ Allows object owners to directly control access using tools like
‘chown’ and ‘chmod’

● SELinux relies on MAC for permissions and access control, not DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SELinux

A

The default context-based permission scheme in CentOS and Red Hat Enterprise Linux created by NSA

■ Used to enforce MAC on processes and resources
■ Enables information to be classified and protected
■ Enhances file system and network security, preventing unauthorized access, security breaches, and execution of untrustworthy programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three Main Contexts in SELinux

User Context

A

Defines which users can access an object, including common contexts like
‘unconfined_u,’ (ALL USERS)
‘user_u,’ (UNPRIVILEGED USERS)
‘sysadm_u,’ (SYSTEM ADMINISTRATORS)
‘root’ (ROOT USER)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three Main Contexts in SELinux

Role Context

A

Determines which roles can access an object, using ‘object_r’ for files and
directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three Main Contexts in SELinux

Type Context

A

Essential for fine-grained access control, grouping objects with similar
security characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Optional Context (4th context)

Level Context

A

● Describes the sensitivity level of a file, directory, or process

● Known as a multi-level security context, allowing further access control refinement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 SELinux Modes

Disabled Mode

A

Turns off SELinux, relying on default DAC for access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 SELinux Modes

Enforcing Mode

A

Enforces all SELinux security policies, preventing policy violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 SELinux Modes

Permissive Mode

A

Enables SELinux but doesn’t enforce policies, allowing processes to
bypass security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SELinux Policies

SELinux Policy

A

Describes access permissions for users, programs, processes, files, and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SELinux Policies: Two Main Policy Types

Targeted Policies

A

Only specific processes are confined to a domain, while others run unconfined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SELinux Policies: Two Main Policy Types

Strict Policies

A

Every subject and object operates under MAC, but it’s more
complex to set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Violation Messages

A

SELinux captures violation messages in an audit log

■ Violations can occur when someone tries to access an unauthorized object, or an
action contradicts an existing policy

17
Q

Policy Configuration

A

Initial SELinux setup may result in false violations, requiring policy tweaking and fine-tuning

■ Strong security depends on creating effective restricted profiles and hardening applications to prevent malicious attacks