▲ | egberts1 a day ago | |
Shoot. Almost there, at least for us cybersecurity-minded folks. A need for a default-deny-all and then select what a process needs is the better security granularity. This default-ALLOW-all is too problematic for today's (and future) security needs. Cuts down on the compliance paperworks too. | ||
▲ | westurner a day ago | parent [-] | |
DAC: Discretionary Access Control: https://en.wikipedia.org/wiki/Discretionary_access_control : > The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control). Which permissions and authorizations can be delegated? DAC is the out of the box SELinux configuration for most Linux distros; some processes are confined, but if the process executable does not have the necessary extended filesystem attribute labels the process runs unconfined; default allow all. You can see which processes are confined with SELinux contexts with `ps -Z`. MAC is default deny all; MAC: Mandatory Access Control: https://en.wikipedia.org/wiki/Mandatory_access_control |