Encyclopedia > Security-Enhanced Linux

  Article Content

Security-Enhanced Linux

The NSA has released Security-Enhanced Linux a security-enhanced version of the Linux operating system kernel and operating system utilities which contains support for mandatory access controls[?] based on the principle of least privilege[?].

Security-enhanced Linux is a research prototype of the Linux kernel and a number of utilities with enhanced security functionality designed simply to demonstrate the value of mandatory access controls to the Linux community and how such controls could be added to Linux. The Security-enhanced Linux kernel contains new architectural components originally developed to improve the security of the Flask operating system[?]. These architectural components provide general support for the enforcement of many kinds of mandatory access control policies, including those based on the concepts of Type Enforcement[?], Role-based Access Control[?], and Multi-level Security[?].

The Security-enhanced Linux kernel enforces mandatory access control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. When confined in this way, the ability of these user programs and system daemons to cause harm when compromised (via buffer overflows or misconfigurations, for example) is reduced or eliminated. This confinement mechanism operates independently of the traditional Linux access control mechanisms. It has no concept of a "root" super-user, and does not share the well-known shortcomings of the traditional Linux security mechanisms (such as a dependence on setuid/setgid binaries).

The security of an unmodified Linux system depends on the correctness of the kernel, all the privileged applications, and each of their configurations. A problem in any one of these areas may allow the compromise of the entire system. In contrast, the security of a modified system based on the Security-enhanced Linux kernel depends primarily on the correctness of the kernel and its security policy configuration. While problems with the correctness or configuration of applications may allow the limited compromise of individual user programs and system daemons, they do not pose a threat to the security of other user programs and system daemons or to the security of the system as a whole.

Features of security-enhanced Linux:

  • Clean Separation of Policy from Enforcement
  • Well-Defined Policy Interfaces
  • Independent of Specific Policies and Policy Languages
  • Independent of Specific Security Label Formats and Contents
  • Individual Labels and Controls for Kernel Objects and Services
  • Caching of Access Decisions for Efficiency
  • Support for Policy Changes
  • Controls over Process Initialization and Inheritance and Program Execution
  • Controls over File Systems, Directories, Files, and Open File Descriptions
  • Controls over Sockets, Messages, and Network Interfaces
  • Controls over Use of "Capabilities"

See also:

External links:



All Wikipedia text is available under the terms of the GNU Free Documentation License

 
  Search Encyclopedia

Search over one million articles, find something about almost anything!
 
 
  
  Featured Article
Flapper

... vast numbers of men did not return from the war, leaving a significant gap between the numbers of single women and men. These factors prompted many post-war women t ...

 
 
 
This page was created in 36.9 ms