Completed
What Are The Alternatives?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
How to Write a Linux Security Module
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why Do You Want To Write A Linux Security Module? We already have terrific security
- 3 When Is A Linux Security Module The Right Choice? Add access control Things controlled by
- 4 Restrictive Controls
- 5 When Is A Linux Security Module The Wrong Choice?
- 6 What Are The Alternatives?
- 7 Security Module Don'ts
- 8 What Do You Want To Protect?
- 9 What Do You Want To Protect it From?
- 10 The Hooks And Blobs Of A Linux Security Module
- 11 Access Control Hooks
- 12 Hooks Are Bail On Fail
- 13 State Maintenance Hooks
- 14 Access Hook Return values
- 15 Infrastructure Managed Security Blobs
- 16 Module Details
- 17 Setting Blob Sizes
- 18 The Blob, the Secid and the Secctx
- 19 Lifecycle Management Of A secctx
- 20 Credentials
- 21 Tasks
- 22 proc//attr
- 23 Object Based Hooks
- 24 Inodes
- 25 Traditional File Security Attributes
- 26 Extended Attributes
- 27 IPC objects and Keys
- 28 CONFIG_SECURITY_PATH
- 29 Aliases
- 30 Symlinks
- 31 Hardlinks
- 32 Mounts
- 33 Mount Namespaces
- 34 Network Hooks
- 35 Network Labels - Secmark
- 36 Network Labels - NetLabel