*** Welcome to piglix ***

SELinux

Security-Enhanced Linux
SELinux admin.png
SELinux administrator GUI in Fedora 8
Original author(s) NSA and Red Hat
Developer(s) Red Hat
Initial release January 1, 1998; 19 years ago (1998-01-01)
Stable release
2.5 / 23 February 2016; 11 months ago (2016-02-23)
Repository github.com/SELinuxProject/selinux
Written in C
Operating system Linux
Type Security, Linux Security Modules (LSM)
License GNU GPL
Website selinuxproject.org/page/Main_Page

Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC).

SELinux is a set of kernel modifications and user-space tools that have been added to various Linux distributions. Its architecture strives to separate enforcement of security decisions from the security policy itself and streamlines the volume of software charged with security policy enforcement. The key concepts underlying SELinux can be traced to several earlier projects by the United States National Security Agency (NSA).

From NSA Security-enhanced Linux Team:

NSA Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible mandatory access control (MAC) architecture into the major subsystems of the kernel. It provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements, which allows threats of tampering and bypassing of application security mechanisms to be addressed and enables the confinement of damage that can be caused by malicious or flawed applications. It includes a set of sample security policy configuration files designed to meet common, general-purpose security goals.

A Linux kernel integrating SELinux enforces mandatory access control policies that confine user programs' and system servers' access to files and network resources. Limiting privilege to the minimum required to work reduces or eliminates the ability of these programs and daemons to cause harm if faulty or compromised (via buffer overflows or misconfigurations, for example). This confinement mechanism operates independently of the traditional Linux (discretionary) access control mechanisms. It has no concept of a "root" super-user, and does not share the well-known shortcomings of the traditional Linux security mechanisms (such as a dependence on setuid/setgid binaries).


...
Wikipedia

...