Документация
>
Руководство по безопасности
>
◀
▶
Часть IV. Ограничение привилегий с AppArmor
Содержание
16. Introducing AppArmor
16.1. Background Information on AppArmor Profiling
17. Getting Started
17.1. Installing AppArmor
17.2. Enabling and Disabling AppArmor
17.3. Choosing the Applications to Profile
17.4. Building and Modifying Profiles
17.5. Updating Your Profiles
18. Immunizing Programs
18.1. Introducing the AppArmor Framework
18.2. Determining Programs to Immunize
18.3. Immunizing cron Jobs
18.4. Immunizing Network Applications
19. Profile Components and Syntax
19.1. Breaking a AppArmor Profile into Its Parts
19.2. Profile Types
19.3.
#include
Statements
19.4. Capability Entries (POSIX.1e)
19.5. Network Access Control
19.6. Paths and Globbing
19.7. File Permission Access Modes
19.8. Execute Modes
19.9. Resource Limit Control
19.10. Auditing Rules
20. AppArmor Profile Repositories
20.1. Using the Local Repository
21. Building and Managing Profiles with YaST
21.1. Adding a Profile Using the Wizard
21.2. Manually Adding a Profile
21.3. Editing Profiles
21.4. Deleting a Profile
21.5. Updating Profiles from Log Entries
21.6. Managing AppArmor
22. Building Profiles from the Command Line
22.1. Checking the AppArmor Module Status
22.2. Building AppArmor Profiles
22.3. Adding or Creating an AppArmor Profile
22.4. Editing an AppArmor Profile
22.5. Deleting an AppArmor Profile
22.6. Two Methods of Profiling
22.7. Important Filenames and Directories
23. Profiling Your Web Applications Using ChangeHat
23.1. Apache ChangeHat
23.2. Configuring Apache for mod_apparmor
24. Confining Users with
pam_apparmor
25. Managing Profiled Applications
25.1. Reacting to Security Event Rejections
25.2. Maintaining Your Security Profiles
26. Support
26.1. Updating AppArmor Online
26.2. Using the Man Pages
26.3. For More Information
26.4. Troubleshooting
26.5. Reporting Bugs for AppArmor
27. AppArmor Glossary