Looking into access privileges

To finish off, let's look at how to verify access privileges granted to users. Specifying roles and privileges allows users to do their job, but from a security point of view, it is also important to verify if (and which) users can manipulate certain resources. Auditors will want to have an overview of who is able to, say, manipulate SELinux policies or read private keys.

How to do it…

To properly investigate access rights, the following approach can help in identifying users (and processes) that have the permissions we want to be informed about:

  1. Verify file permissions that are not related to SELinux.
  2. Verify direct access to the resource (such as read rights on private keys).
  3. Look at who (users or applications) has the ...

Get SELinux Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.