摘要(英) |
Nowadays, The concept of Access Control exists everywhere in our daily life and can protect our asset from unauthorized use, for example us- ing badge to enter the company entrance gate or card key when you back to home. In the area of Information Security, Access Control, a part of Risk Management, is used to keep confidentiality, integrity and availabil- ity of information, which are usually called CIA triad, from unauthorized disclosure, disruption and access. Access to protected information must be restricted to people who are authorized to access the information. The computer programs, and in many cases the computers that process the information, must also be authorized. This requires that mechanisms are in place to control the access to protected information according to Access Control procedures or policies specified by Administrator. Essentially, the core of Access Control, procedures or policies are implemented to make the mechanism know how to ensure which subject is authorized to access what object within the organizations. The hardest part of Access Control is to create a suitable policy which can not restrict too strict or loose. SELinux is prevalently applied to cloud server and embedded system, but seldom people really know how to configure SELinux or correctly enable SELinux on their system. With the regulation and law progressing, vendors is asked to protect their devices with Access Control. However, there are less pa- pers describing how to apply SELinux on the system in technical detail. Hence, this paper is managed to help people enable and configure SELinux on their system step by step. |
參考文獻 |
[1] Wikipedia. (2020). “Information security,” [Online]. Available: https://en.wikipedia. org/wiki/Information_security (visited on 06/04/2020).
[2] P. Samarati and S. C. de Vimercati, “Access control: Policies, models, and mecha- nisms,” in Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2001, pp. 137–196, isbn: 978- 3-540-45608-7.
[3] S. Community. (2008). “Smack,” [Online]. Available: http://schaufler-ca.com/ (visited on 06/04/2020).
[4] A. Community. (2012). “Agl,” [Online]. Available: https://www.automotivelinux. org/ (visited on 06/04/2020).
[5] C.-H. Liu. (2019). “Smack-based application whitelisting on agl,” [Online]. Avail- able: https://ossalsjp19.sched.com/event/OVqp/smack-based-application- whitelisting-on-agl-che-hao-liu-chuan-yu-cho-industrial-technology- research-institute-taiwan (visited on 06/04/2020).
[6] A. Community. (2009). “Apparmor,” [Online]. Available: https://wiki.ubuntu. com/AppArmor (visited on 06/04/2020).
[7] J. Morris. (2008). “Selinux project,” [Online]. Available: https://selinuxproject. org/page/Main_Page (visited on 06/04/2020).
[8] Wikipedia. (2018). “Comparison with apparmor,” [Online]. Available: https://en. wikipedia.org/wiki/Security-Enhanced_Linux#Comparison_with_AppArmor (visited on 06/04/2020).
[9] (2008). “Selinux project github,” [Online]. Available: https://github.com/ SELinuxProject (visited on 06/04/2020).
[10] (2008). “Selinux classes and permissions,” [Online]. Available: https://selinuxproject. org/page/NB_ObjectClassesPermissions (visited on 06/04/2020).
[11] (2008). “Selinux constraint,” [Online]. Available: https://selinuxproject.org/ page/ConstraintStatements (visited on 06/04/2020).
[12] D. Walsh. (2013). “Selinux access control model guide,” [Online]. Available: https: //opensource.com/business/13/11/selinux-policy-guide (visited on 06/04/2020).
[13] (2008). “Auditing selinux events,” [Online]. Available: https://selinuxproject. org/page/NB_AL (visited on 06/04/2020).
[14] (2019). “Auditing record types,” [Online]. Available: https://access.redhat. com/articles/4409591#audit-record-types-2 (visited on 06/04/2020).
94
[15] (2019). “Linux audit github,” [Online]. Available: https://github.com/linux- audit (visited on 06/04/2020).
[16] (2019). “Linux audit official,” [Online]. Available: https://people.redhat.com/ sgrubb/audit/index.html (visited on 06/04/2020).
[17] (2019). “Linux audit rule man page,” [Online]. Available: http://man7.org/ linux/man-pages/man7/audit.rules.7.html (visited on 06/04/2020).
[18] (2017). “Linux audit system architecture,” [Online]. Available: https://wiki. itcollege.ee/index.php/Auditd#cite_note-1 (visited on 06/04/2020).
[19] S. Grubb. (2020). “Linux audit service auditd man page,” [Online]. Available: http: //man7.org/linux/man-pages/man8/auditd.8.html (visited on 06/04/2020).
[20] ——, (2020). “Linux audit service config file auditd.conf man page,” [Online]. Avail- able: http://man7.org/linux/man-pages/man5/auditd.conf.5.html (visited on 06/04/2020).
[21] (2008). “Nb policytype,” [Online]. Available: https://selinuxproject.org/ page/NB_PolicyType (visited on 06/04/2020).
[22] (2008). “Selinux reference policy github,” [Online]. Available: https://github. com/SELinuxProject/refpolicy (visited on 06/04/2020).
[23] (2008). “Selinux policy language,” [Online]. Available: https://selinuxproject. org/page/PolicyLanguage (visited on 06/04/2020).
[24] (2008). “Selinux policy language, kernel policy language,” [Online]. Available: https: //selinuxproject.org/page/PolicyLanguage#Kernel_Policy_Language (vis- ited on 06/04/2020).
[25] (2016). “Raspberry pi 3 b+,” [Online]. Available: https://www.raspberrypi.org/ products/raspberry-pi-3-model-b-plus/ (visited on 06/04/2020).
[26] G. Automake. (2020). “Cross-compile,” [Online]. Available: https://www.gnu. org/software/automake/manual/html_node/Cross_002dCompilation.html (visited on 06/04/2020).
[27] J. Preshing. (2014). “How to build a gcc cross-compiler,” [Online]. Available: https: //preshing.com/20141119/how-to-build-a-gcc-cross-compiler/ (visited on 06/04/2020).
[28] (1996). “Binutils,” [Online]. Available: https://www.gnu.org/software/binutils/ (visited on 06/04/2020).
[29] pchang9. (2020). “Busybox patch for login program,” [Online]. Available: http:// lists.busybox.net/pipermail/busybox/2020-January/087740.html (visited on 06/04/2020).
95
[30] S. Smalley and R. Craig, “Security enhanced (se) android: Bringing flexible mac to android,” in Foundations of Security Analysis and Design, NDSS Symposium, 2013.
[31] P. Loscocco and S. Smalley, “Integrating flexible support for security policies into the linux operating system,” in Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, USA: USENIX Association, 2001, pp. 29–42, isbn: 1880446103.
[32] (2011). “Cve-2011-1823,” [Online]. Available: https://cve.mitre.org/cgi- bin/cvename.cgi?name=CVE-2011-1823 (visited on 06/04/2020).
[33] (2019). “Cve-2019-5736,” [Online]. Available: https://cve.mitre.org/cgi- bin/cvename.cgi?name=CVE-2019-5736 (visited on 06/04/2020). |