LinuxTraining.com

.

RHEL SELinux Policy Administration

GL429 - RHEL SELinux Policy Administration

Upcoming GL429 Classes

  1. Request Class

This advanced security course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

Students will gain hands-on experience in working with SELinux modes, virtualization, and container security. The core of the course is learning and understanding SELinux policy through, choosing, managing, and studying policy examples. Once students have an understanding of the SELinux policy the course will cover writing policy modules. The course is capped with multiple discussions on case studies that explore building SELinux policies. This SELinux course covers one of the major challenge faced by administering SELinux, SELinux troubleshooting.

Prerequisites:

The GL120 "Linux Fundamentals" and GL250 "Enterprise Linux Systems Administration courses.

Supported Distributions:

Red Hat Enterprise Linux 7

Course Outline:

  1. Computing Security & SELinux Overview
    1. Security Threats
    2. Network and Host Protection
    3. Shortcomings of Traditional Unix Security
    4. DAC vs. MAC
    5. SELinux Goals
    6. SELinux Evolution
    7. SELinux Features and Limitations
    8. SELinux Contexts
    9. Labels
    10. Access Decisions
    11. Transition Decisions: Processes
    12. SELinux Example
    Lab Tasks
    1. System Preparation
    2. Contexts
  2. Working with SELinux
    1. SELinux Modes
    2. Gathering SELinux Information
    3. SELinux Virtual Filesystem
    4. Core Commands and SELinux
    5. SELinux Management Utilities
    6. Context and File Operations
    7. Managing File Context Database
    8. Managing Contexts
    9. Booleans
    10. SELinux Mount Options
    11. Virtualization Security
    12. Container Security
    13. Securing Networked Services
    14. Managing Port Contexts
    Lab Tasks
    1. Exploring SELinux Modes
    2. Gathering Information
    3. Managing SELinux Booleans
    4. Managing Contexts
    5. Mounting Filesystems
    6. Manual Relabel
    7. GUI Utilities
  3. Policies
    1. The SELinux Policy
    2. Choosing an SELinux Policy
    3. Policy Layout
    4. Examining Policy
    5. Managing Policies
    6. Targeted Policy
    7. Targeted Policy Example: Apache
    8. Targeted Policy Example: Other Contexts
    9. Minimum Policy
    10. MLS Policy Overview
    11. MCS Translation
    12. Polyinstantiated Directories
  4. Users & Roles
    1. Overview of Roles
    2. Roles
    3. User Mappings
    4. Kiosk User (xguest)
    5. Controlling Application Execution
    Lab Tasks
    1. SELinux Identities and Roles
    2. Kiosk User
  5. Troubleshooting SELinux
    1. Access Denied. Now what?
    2. AVC Denied Examples
    3. Incorrect File Context
    4. Permissive Domains
    5. Using audit2allow
    Lab Tasks
    1. Troubleshooting using Permissive Domains
    2. Using audit2why and audit2allow to create policy
  6. Writing Policy Modules
    1. SELinux Policy Tools
    2. SELinux Policy Source
    3. Reference Policy Source Exploration
    4. Process Transitions
    5. Object classes
    6. Policy Macros
    7. Creating Booleans
    8. Using Booleans in Policies
    9. Other Policy Commands
    10. Writing Policy Modules
    Lab Tasks
    1. Domain Transition Exploration
    2. Exploring SELinux Modes
    3. Writing a Simple Module
    4. Defining and using booleans
    5. Creating & Compiling Policy from Source
    6. Using seplogen
  7. Case Study: Securing an Application Lab Tasks
    1. SELinux Policy Building: Case Study 1
  8. Case Study: Securing an Application Lab Tasks
    1. SELinux Policy Building: Case Study 2
  9. Bonus Labs: Lab Tasks
    1. Installing and Switching Policies
    2. Minimum policy
    3. MCS Exploration
    4. MCS Restrictions
    5. Polyinstantiated Directories