Course Overview

This advanced security course takes a deep dive into the complexities and nuances of SELinux. The course discusses security threats posed to today’s computing resources and mitigating them through network and host protections. Students will review SELinux technology through understanding SELinux’s goals, how it has evolved including its features and limitations.

CLASS INFORMATION
Price: 
Call for Pricing
Duration: 
3 days
  • Students will gain hands-on experience in working with SELinux modes, virtualization, and container security. The core of the course is learning and understanding SELinux policy through choosing, managing, and studying policy examples. Once students have an understanding of the SELinux policy the course will cover writing policy modules. The course is capped with multiple discussions on case studies that explore building SELinux policies. This SELinux course covers one of the major challenges faced by administering SELinux, SELinux troubleshooting.

  • Module 1: COMPUTING SECURITY & SELINUX OVERVIEW

    • Security Threats
    • Network and Host Protection
    • Shortcomings of Traditional Unix Security
    • DAC vs. MAC
    • SELinux Goals
    • SELinux Evolution
    • SELinux Features and Limitations
    • SELinux Contexts
    • Labels
    • Access Decisions
    • Transition Decisions: Processes
    • SELinux Example

    Module 2: WORKING WITH SELINUX

    • SELinux Modes
    • Gathering SELinux Information
    • SELinux Virtual Filesystem
    • Core Commands and SELinux
    • SELinux Management Utilities
    • Context and File Operations
    • Managing File Context Database
    • Managing Contexts
    • Booleans
    • SELinux Mount Options
    • Virtualization Security
    • Container Security
    • Securing Networked Services
    • Managing Port Contexts

    Module 3: POLICIES

    • The SELinux Policy
    • Choosing an SELinux Policy
    • Policy Layout
    • Examining Policy
    • Managing Policies
    • Targeted Policy
    • Targeted Policy Example: Apache
    • Targeted Policy Example: Other Contexts
    • Minimum Policy
    • MLS Policy Overview
    • MCS Translation
    • Polyinstantiated Directories

    Module 4: USERS & ROLES

    • Overview of Roles
    • Roles
    • User Mappings
    • Kiosk User (xguest)
    • Controlling Application Execution

    Module 5: TROUBLESHOOTING SELINUX

    • Access Denied. Now what?
    • AVC Denied Examples
    • Incorrect File Context
    • Permissive Domains
    • Using audit2allow

    Module 6: WRITING POLICY MODULES

    • SELinux Policy Tools
    • SELinux Policy Source
    • Reference Policy Source Exploration
    • Process Transitions
    • Object classes
    • Policy Macros
    • Creating Booleans
    • Using Booleans in Policies
    • Other Policy Commands
    • Writing Policy Modules

    Module 7: CASE STUDY: SECURING AN APPLICATION LAB TASKS

    • SELinux Policy Building: Case Study 1

    Module 8: CASE STUDY: SECURING AN APPLICATION LAB TASKS

    • SELinux Policy Building: Case Study 2
    • Module 1: LAB TASKS
      • System Preparation
      • Contexts
    • Module 2: LAB TASKS
      • Exploring SELinux Modes
      • Gathering Information
      • Managing SELinux Booleans
      • Managing Contexts
      • Mounting Filesystems
      • Manual Relabel
      • GUI Utilities
    • Module 4: LAB TASKS
      • SELinux Identities and Roles
      • Kiosk User
    • Module 5 LAB TASKS
      • Troubleshooting using Permissive Domains
      • Using audit2why and audit2allow to create policy
    • Module 6 LAB TASKS
      • Domain Transition Exploration
      • Exploring SELinux Modes
      • Writing a Simple Module
      • Defining and using booleans
      • Creating & Compiling Policy from Source
      • Using seplogen
    • BONUS LABS: LAB TASKS
      • Installing and Switching Policies
      • Minimum policy
      • MCS Exploration
      • MCS Restrictions
      • Polyinstantiated Directories
  • The Linux Fundamentals and Enterprise Linux Systems Administration courses are prerequisites for this course.