{"id":1476,"date":"2023-10-13T12:13:28","date_gmt":"2023-10-13T06:43:28","guid":{"rendered":"https:\/\/www.veeble.org\/kb\/?p=1476"},"modified":"2025-02-28T10:43:18","modified_gmt":"2025-02-28T05:13:18","slug":"enhancing-linux-security-with-selinux","status":"publish","type":"post","link":"https:\/\/www.veeble.com\/kb\/enhancing-linux-security-with-selinux\/","title":{"rendered":"Enhancing Linux Security with SELinux: 3 Modes to know"},"content":{"rendered":"\n<p>I want to share my personal experience as a server administrator with Security-Enhanced Linux (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Security-Enhanced_Linux#:~:text=Security%2DEnhanced%20Linux%20(SELinux),mandatory%20access%20controls%20(MAC).\" target=\"_blank\" rel=\"noopener\">SELinux<\/a>), a powerful security architecture for <a href=\"https:\/\/www.veeble.org\/vps-hosting\/\" target=\"_blank\" rel=\"noopener\">Linux systems<\/a> that gives administrators more control over who can access their servers.&nbsp; One of SELinux&#8217;s standout features is its ability to grant distinct permissions to various processes. Imagine you&#8217;re running a web server and need it to access your document root for reading and writing. SELinux lets you craft a policy to ensure that only the web server process can perform these actions. It&#8217;s like handing out keys to specific doors while, on the other hand, keeping others securely locked. However, this selective access control ensures that only authorized individuals can enter, thereby enhancing security.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"unleashing-the-power-of-selinux\">Unleashing the Power of SELinux<\/h3>\n\n\n<p>SELinux operates on the concept of <a href=\"https:\/\/www.ibm.com\/docs\/en\/zos\/2.1.0?topic=environment-mandatory-access-control-mac\" target=\"_blank\" rel=\"noopener\">Mandatory Access Controls (MAC)<\/a>, which go beyond the traditional <a href=\"https:\/\/www.ibm.com\/docs\/sl\/zos\/2.4.0?topic=controls-discretionary-access-control-dac\" target=\"_blank\" rel=\"noopener\">Discretionary Access Control (DAC) <\/a>you might be familiar with. Discretionary Access Control (DAC) empowers users and processes to manage their resource access. In contrast, SELinux flips the script by placing restrictions on users and processes based on rules and policies set by the system administrator. It&#8217;s not your typical security measure; it&#8217;s a higher tier of access control.<\/p>\n\n\n\n<p>You might wonder how SELinux accomplishes this feat. Think of it as a virtual bouncer stationed at the entrance to your system, effectively ensuring that it only allows authorized individuals to pass through the door. SELinux processes files that administrators pre-approve, <strong>thereby<\/strong> preventing any unauthorized access and, <strong>as a result<\/strong>, bolstering your system&#8217;s security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>For most system users, SELinux operates quietly in the background, seamlessly safeguarding your system. Moreover, its presence won&#8217;t disrupt your daily tasks.The beauty of SELinux lies in its flexibility &#8211; you have the power to customize your security policies, determining the level of strictness or leniency that best suits your server environment.<\/p>\n\n\n\n<p>Enhancing your server&#8217;s security with SELinux is a wise decision. Furthermore, it&#8217;s like having an invisible fortress around your Linux system, allowing you to define who gains access and who remains locked out. Moreover, the power of SELinux lies in its ability to bolster your defenses, ensuring that your server remains impenetrable to unauthorized intruders.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-decision-making-process-for-selinux\">The decision making process for SELinux<\/h3>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"487\" src=\"https:\/\/www.veeble.org\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-1024x487.png\" alt=\"SELinux architecture\" class=\"wp-image-1487\" style=\"aspect-ratio:2.102669404517454;width:702px;height:auto\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-1024x487.png 1024w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-300x143.png 300w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-768x365.png 768w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1.png 1186w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>When an application (subject) attempts to access a file (object), the kernel&#8217;s policy enforcement server checks an access vector cache (AVC). This cache stores subject and object permissions, ensuring secure access. <\/p>\n\n\n\n<p>Consequently, if the AVC data cannot make a decision, the system forwards the request to the security server, which then searches a matrix for the security context of the application and the file. Permission is then granted or denied, and if denied, it issues an avc: denied message. The installed policy applies the security context of subjects and objects, providing information to populate the security server&#8217;s matrix.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"selinux-modes\">SELinux Modes<\/h3>\n\n\n<p>For troubleshooting and configuration, SELinux offers three different <a href=\"https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/selinux-mode.html#:~:text=SELinux%20supports%20enforcing%2C%20permissive%2C%20and,when%20developing%20policies%20or%20troubleshooting.\" target=\"_blank\" rel=\"noopener\">modes<\/a>, each serving a distinct purpose:<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"1-enforcing-mode\">1. Enforcing Mode:<\/h4>\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-2f0e9422\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-b95251dd\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-85415536\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-1a37b642\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n<\/div><\/div>\n\n\n\n<p>           For example, by implementing security measures, it can effectively prevent a web server from reading files with a context not explicitly allowed.<\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-88815a4c\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-7f3f50c4\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-a4f8cf8f\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ab15069a\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n<\/div><\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"2-permissive-mode\">2. Permissive Mode:<\/h4>\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-807a81f8\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-f2e0e9d0\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-58aeac11\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-79943897\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n<\/div><\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"3-disabled-mode\">3. Disabled Mode:<\/h4>\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-fd760f43\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-73003cda\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-7bac63d1\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-6e90458d\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">List item<\/span><\/div>\n<\/div><\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"configuration-file-and-checking-the-current-mode\">Configuration File and Checking the Current Mode<\/h3>\n\n\n<p>To configure SELinux and check its current mode, you can access the SELinux configuration file and use the &#8220;getenforce&#8221; command:<\/p>\n\n\n\n<p><strong>Configuration File: <\/strong> You can open the SELinux configuration file with your preferred text editor. The configuration file is typically located at<strong> \/etc\/selinux\/config.<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># vi \/etc\/selinux\/config.\n<\/code><\/pre>\n\n\n\n<p><strong>Checking the Current Mode: <\/strong>To determine the current SELinux mode, execute the &#8220;<strong>getenforce<\/strong>&#8221; command:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># getenforce<\/code><\/pre>\n\n\n\n<p><br>Understanding <a href=\"https:\/\/en.wikipedia.org\/wiki\/Security-Enhanced_Linux\" target=\"_blank\" rel=\"noopener\">SELinux<\/a> modes and the decision-making process is crucial for effectively managing and troubleshooting SELinux on your system. Additionally, it empowers you to control access and enhance the security of your Linux environment.<\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-block-2f56ea25 wp-block-button\"><div class=\"uagb-cta__wrap\"><h3 class=\"uagb-cta__title\">Blazing Fast Hosting<\/h3><p class=\"uagb-cta__desc\">Experience lightning-fast speeds and rock-solid reliability with our cPanel hosting. Get your website online today!<\/p><\/div><div class=\"uagb-cta__buttons\"><a href=\"https:\/\/www.veeble.com\/in\/cpanel-hosting\/\" class=\"uagb-cta__button-link-wrapper wp-block-button__link\" target=\"_blank\" rel=\"noopener noreferrer\">Choose Your Plan<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I want to share my personal experience as a server administrator with Security-Enhanced Linux (SELinux), a powerful security architecture for Linux systems that gives [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":1487,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9,5],"tags":[],"class_list":["post-1476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-firewallsecurity","category-linux"],"uagb_featured_image_src":{"full":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1.png",1186,564,false],"thumbnail":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-150x150.png",150,150,true],"medium":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-300x143.png",300,143,true],"medium_large":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-768x365.png",768,365,true],"large":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1-1024x487.png",1024,487,true],"1536x1536":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1.png",1186,564,false],"2048x2048":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2023\/10\/SELinux-architecture-1.png",1186,564,false]},"uagb_author_info":{"display_name":"Nayana Nair","author_link":"https:\/\/www.veeble.com\/kb\/author\/nayana\/"},"uagb_comment_info":0,"uagb_excerpt":"I want to share my personal experience as a server administrator with Security-Enhanced Linux (SELinux), a powerful security architecture for Linux systems that gives [&hellip;]","_links":{"self":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/1476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/comments?post=1476"}],"version-history":[{"count":18,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/1476\/revisions"}],"predecessor-version":[{"id":7576,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/1476\/revisions\/7576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/media\/1487"}],"wp:attachment":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/media?parent=1476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/categories?post=1476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/tags?post=1476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}