Preview

Selinux

Satisfactory Essays
Open Document
Open Document
7859 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Selinux
Blueprints

First Steps with Security-Enhanced Linux (SELinux): Hardening the Apache Web Server

Blueprints

First Steps with Security-Enhanced Linux (SELinux): Hardening the Apache Web Server

Note Before using this information and the product it supports, read the information in “Notices” on page 17.

First Edition (August 2009) © Copyright IBM Corporation 2009. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents
Introduction . . . . . . . . . . . . . v First Steps with Security-Enhanced Linux (SELinux): Hardening the Apache Web Server . . . . . . . . . . . . . 1
Scope, requirements, and support Security-Enhanced Linux overview Access control: MAC and DAC SELinux basics. . . . . . SELinux and Apache . . . . Installing and running HTTPD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 1 2 5 5 HTTPD and context types . . . . . . . . . 5 HTTPD and SELinux Booleans . . . . . . . 8 Configuring HTTPD security using SELinux . . . . 9 Securing Apache (static content only) . . . . . 9 Hardening CGI scripts with SELinux . . . . . 12

Appendix. Related information and downloads . . . . . . . . . . . . . 15 Notices . . . . . . . . . . . . . . 17
Trademarks . . . . . . . . . . . . . . 18

© Copyright IBM Corp. 2009

iii

iv

Blueprints: First Steps with Security-Enhanced Linux (SELinux): Hardening the Apache Web Server

Introduction
This blueprint provides a brief introduction to basic Security-Enhanced Linux (SELinux) commands and concepts, including Boolean variables. In addition, the paper shows you how to increase the security of the Apache Web server with SELinux by using these concepts. Key tools and technologies discussed in this demonstration include security-enhanced Linux (SELinux), mandatory access control (MAC), getenforce, sestatus, getsebool, and setsebool.

Intended audience
This blueprint is intended

You May Also Find These Documents Helpful

  • Good Essays

    The security controls for this or any project should be a high priority and should be understood by every individual involved in the project. To determine this we will use the questions…

    • 775 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1967 Words
    • 8 Pages

    Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened…

    • 1967 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Security of web applications first begins with configuring the server itself with strict security in mind. Many will often deploy various layers such as a WAF, IDS, or Mod Security to react in real time to various hacking and threats for HTTP requests. However, securing the entire server and any running services with a high level of security in mind is the first fundamental step to avoid the risk of being hacked or compromised.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    File access is very important for any organization. The organization has to make sure that the proper personnel are given access to the files that they need to work on or need to get information they need. Even more important than to give the right personnel access, keeping unauthorized users from entering the files is more important. In this paper, the scenario of a system that supports 5,000 users and only 4,990 of said users would have access to one file will be use. The question to be answered is of how to specify this protection scheme in UNIX. It is very important to set up a protection scheme that will allow control access and viewing privileges of specific files to a number of different users. It is also a necessary task to ensure the integrity of…

    • 699 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Caldwell (2010) also includes a background understanding of how to access shared resources (e.g., folders and printers), configure authentication and authorization, and implement home group and user account controls. His ability to clearly distinguish authentication and authorization eliminated confusion that these two functionalities are not synonymous.…

    • 1887 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Nowadays, security software is becoming a major part of enterprise business. Software development is activity connected with advanced technology and high level of knowledge. After viewing the growing number of malicious activity, it is now imperative that we develop a plan and stick to it. There are so many threats to vulnerabilities and threats that leave systems open to malicious attacks. Whenever you sit at a computer and log onto the internet, your system, becomes vulnerable. There is now potential for malicious attacks. Knowing what to look for can prevent a lot of these attacks.…

    • 534 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Headlines. (2012, 0522). Anonymous claims department of justice hack, data dump. Retrieved from http://anonnews.org/press/item/1521/ Information Security: Recent Attacks on Federal Web Sites Underscore Need for Stronger…

    • 1656 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    There is nothing more important in any business than securing your network topology from hardware, design and software. This plan is called network hardening and this plan needs to be incredibly detailed with how the network will be secured in each area. The first step to the network hardening plan resides in how you will build the network and then from there how you will secure each section of the network. This paper will discuss access control measures, encryption, PKI, certificates, OS hardening, application hardening, transmission, remote access protection protocols, wireless security, anti-virus software as well as spyware, and email security.…

    • 2847 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Downloaded from http://ppa.sagepub.com by guest on April 12, 2008 © 2002 SAGE Publications and PAC…

    • 9282 Words
    • 38 Pages
    Powerful Essays
  • Powerful Essays

    Thus began the opening chapter of one of the foundation books in the computer security field. This book, commissioned by the National Academy of sciences, was the product of twenty-one…

    • 2101 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Term Paper

    • 1470 Words
    • 5 Pages

    References: BIBLIOGRAPHY l 1033 Garfinkel, S., Spafford, G., & Schwartz, A. (2003). Practical UNIX and Internet Security. O 'reilly.…

    • 1470 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    File Management

    • 775 Words
    • 4 Pages

    Protection of files needs to be set up so that there is access given to users on a system in three different permission categories. The first is the permission to read a file. The second is the permission to write or make changes to a file. The final is the permission to run or execute a file. A UNIX system sets up three classifications for its users; an owner or user, a group, and the other. First is the owner, which is the creator of a file, or the user at a specific time of a file. A group is a class to which the user or owner belongs. A group could be a department of a company or any other type of grouping with specific members. Last, the other is the general World Wide Web audience (“Unix Protection and Permissions”, n.d.).…

    • 775 Words
    • 4 Pages
    Good Essays

Related Topics