* RHEL5 Security Guide draft TOC for review/comment
@ 2006-07-28 1:51 David O'Brien
2006-07-31 1:11 ` David O'Brien
0 siblings, 1 reply; 2+ messages in thread
From: David O'Brien @ 2006-07-28 1:51 UTC (permalink / raw)
To: Forrest Taylor, Harald Hoyer, James Morris, Karsten Wade,
Nalin Dahyabhai, NSA_SELinux List, Stephen John Smoogen,
Stephen Smalley, Thomas Woerner, Tomas Mraz, Ulrich Drepper,
David Howells
[-- Attachment #1: Type: text/plain, Size: 1171 bytes --]
Firstly, apologies if you receive this twice. I'm casting a wide net...
I've attached the draft TOC of the Red Hat Enterprise Linux 5 Security Guide
for all to review and comment on. (Despite appearances it's not supposed to
be a valid xml file; I wrote it that way for my own convenience.) As
mentioned in the Scope Statement (attached), this is the integration of the
RHEL4 Security Guide and the SELinux Guide. Our focus for this release is on
accuracy and use cases, at the expense of low-level details.
Please feel free to make any suggestions about structure, topics, etc., how we
could use/enhance this info from other areas (Training?) or vice versa.
I have a few names down for reviewers, authors/editors, etc., (see comments in
file) but am looking for more. If there is an area where you feel you could
contribute, please put your hand up. All contributors will be acknowledged
and included in the colophon, and earn our undying gratitude. :-)
cheers
--
David O'Brien
Red Hat Asia Pacific Pty Ltd
Tel: +61-7-3514-8189
Fax: +61-7-3514-8199
email: daobrien@redhat.com
web: http://apac.redhat.com/
IRC: daobrien #docs #selinux #devel #doc-i18n
[-- Attachment #2: RHEL5SecurityGuideScopeStatement --]
[-- Type: text/plain, Size: 1318 bytes --]
RHEL5 Security Guide
Scope Statement
The RHEL5 Security Guide integrates two previously separate guides: The Red Hat Enterprise Linux 4 Security Guide and the Red Hat Enterprise Linux 4 SELinux Guide. These guides are being integrated and updated to provide a single source of information for all security-related topics for Red Hat Enterprise Linux.
The RHEL5 Security Guide provides a general introduction to security, and from the perspective of Red Hat Linux in particular. It provides conceptual information in the areas of security assessment, common exploits, and intrusion and incident response. It also provides conceptual and specific configuration information for hardening Workstation, Server, VPN, firewall and other implementations using SELinux. A Troubleshooting section provides information on common problems and how to resolve them.
The RHEL5 Security Guide assumes a basic knowledge of IT security, and consequently provides only minimal coverage of common security practices such as controlling physical access, sound account-keeping policies and procedures, auditing, etc. Neither does it cover the intricacies of SELinux in detail, such as writing policies for certain 3rd party applications. Where appropriate, reference is made to external resources for this and related information.
[-- Attachment #3: RHEL5SecurityGuideTOC.xml --]
[-- Type: text/xml, Size: 5357 bytes --]
<part>
Security And Authentication
<chapter>Security Overview
<!-- Reviewed by David O'Brien daobrien@redhat.com -->
<section>Introduction
What is Computer Security?
How did Computer Security Come about?
Security Controls
Conclusion
</section>
<section>
Vulnerability Assessment
Thinking Like the Enemy
Defining Assessment and Testing
Evaluating the Tools
</section>
<section>
Attackers and Vulnerabilities
A Quick History of Hackers
Threats to Network Security
Threats to Server Security
Threats to Workstation and Home PC Security
</section>
<section>
Common Exploits and Attacks
</section>
<section>
Security Updates
Updating Packages
</section>
</chapter>
<chapter>Securing Your Network
<section>Workstation Security
<!-- David O'Brien doing initial review -->
REVIEW
Evaluating Workstation Security
BIOS and Boot Loader Security
Password Security
Administrative Controls
<!-- waiting for David Sainty review? -->
Available Network Services
Personal Firewalls
Security Enhanced Communication Tools
</section>
<section>
Server Security
<!-- David O'Brien doing initial review -->
REVIEW
Securing Services With TCP Wrappers and xinetd
Securing Portmap
Securing NIS
Securing NFS
Securing the Apache HTTP Server
Securing FTP
Securing Sendmail
Verifying Which Ports Are Listening
</section>
<section>
Pluggable Authentication Modules (PAM)
REVIEW
<!-- Some updates available but would like a volunteer. May get tmraz@redhat.com or nalin@redhat.com more involved? -->
</section>
<section>
TCP Wrappers and xinetd
REVIEW
<!-- Trying to get twoerner@redhat.com to volunteer :-) -->
</section>
<section>
Kerberos
<!-- Being reviewed by Nalin Dahyabhai <nalin@redhat.com> -->
</section>
<section>
Virtual Private Networks
<!-- Lining up Bill Nottingham <notting@redhat.com> and Harald Hoyer <harald@redhat.com> for review -->
REVIEW
VPNs and Red Hat Enterprise Linux
IPsec
IPsec Installation
IPsec Host-to-Host Configuration
IPsec Network-to-Network configuration
</section>
<section>
Firewalls
<!-- Looking for reviewer -->
REVIEW
Netfilter and iptables
Using iptables
Common iptables Filtering
FORWARD and NAT Rules
Viruses and Spoofed IP Addresses
iptables and Connection Tracking
ip6tables
Additional Resources
</section>
<section>
iptables
<!-- Looking for reviewer -->
REVIEW
<!-- Should we leave this here or move up to "Firewalls"? -->
</section>
</chapter>
<chapter>SELinux Overview
<!-- Looking for technical reviewers for all of the following -->
<!-- In the absence of resources to effectively review the SELinux chapters, topics can be dropped for RHEL5 and picked up later. This applies especially to low-level, detailed information. Refer to the Scope Statement for further guidelines. -->
<section>
SELinux Architectural Overview
<!-- VERY QUICK REVIEW -->
Flask Security Architecture and SELinux
SELinux, an Implementation of Flask
</section>
<section>
SELinux Policy Overview
<!-- VERY QUICK REVIEW -->
What Is Policy?
Where is the Policy?
Policy Role in Boot
<!-- CAREFULLY REVIEW THE FOLLOWING -->
File System Security Contexts
Object Classes and Permissions
TE Rules - Attributes
TE Rules - Types
TE Rules - Access Vectors
Policy Macros
SELinux Users and Roles
TE Rules - Constraints
Special Interfaces and File Systems
</section>
<section>
Targeted Policy Overview
What is the Targeted Policy?
Files and Directories of the Targeted Policy
<!-- CAREFULLY REVIEW THE FOLLOWING -->
Understanding the File Contexts Files
Common Macros in the Targeted Policy
Understanding the Roles and Users in the Targeted Policy
</section>
<section>
Multi-Level Security Overview
WRITE FROM BLOGS
<!-- David O'Brien daobrien@redhat.com to write draft. Looking for reviewer -->
</section>
<section>
Multi-Category Security Overview
WRITE FROM BLOGS
<!-- David O'Brien daobrien@redhat.com to write draft. Looking for reviewer -->
</section>
</chapter>
<chapter>Working with SELinux
<section>
Controlling and Maintaining SELinux
<!-- CAREFULLY REVIEW THE FOLLOWING -->
End User Control of SELinux
Administrator Control of SELinux
Analyst Control of SELinux
Policy Writer Control of SELinux
</section>
<section>
Tools for Manipulating and Analyzing SELinux
<!-- CAREFULLY REVIEW THE FOLLOWING -->
Information Gathering Tools
Using seaudit for Audit Log Analysis
</section>
<section>
Compiling SELinux Policy
<!-- CAREFULLY REVIEW THE FOLLOWING -->
Policy Compile Procedure
What Happens During Policy Build
</section>
<section>
Customizing and Writing Policy
<!-- CAREFULLY REVIEW THE FOLLOWING -->
General Policy Troubleshooting Guidelines
Minor Customizations of the Existing Policy
Writing New Policy for a Daemon
Deploying Customized Binary Policy
</section>
</chapter>
<chapter>Appendixes
<section>
SELinux Use Cases
CAREFULLY REVIEW THE FOLLOWING
Example Policy Reference - dhcpd
</section>
<section>
Comparing MCS and ACL
WRITE FROM BLOGS
<!-- David O'Brien daobrien@redhat.com to write draft. Looking for reviewer -->
</section>
</chapter>
<chapter>References
UPDATE
</chapter>
</part>
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: RHEL5 Security Guide draft TOC for review/comment
2006-07-28 1:51 RHEL5 Security Guide draft TOC for review/comment David O'Brien
@ 2006-07-31 1:11 ` David O'Brien
0 siblings, 0 replies; 2+ messages in thread
From: David O'Brien @ 2006-07-31 1:11 UTC (permalink / raw)
To: fedora-selinux-list-request, NSA_SELinux List,
redhat-lspp@redhat.com
Cc: David Howells, Forrest Taylor, Harald Hoyer, James Morris,
Karsten Wade, Nalin Dahyabhai, Stephen John Smoogen,
Stephen Smalley, Thomas Woerner, Tomas Mraz, Ulrich Drepper
top posting...
I've received a number of replies to this, offering suggestions and review
time, etc. Thanks to all.
I'll start collating comments and suggestions from everyone and put together a
revised TOC.
I have a number of volunteers for SELinux, which is great, so I'll have to ask
that people nominate a "focus-area", be it Policy, Troubleshooting, End-user
Control, Administrator Control, whatever. That way people can check out the
appropriate file and have their way with it, without fear of treading on
toes.
thanks everyone for the feedback and offers to help.
David
On Friday 28 July 2006 11:51, David O'Brien wrote:
> Firstly, apologies if you receive this twice. I'm casting a wide net...
>
> I've attached the draft TOC of the Red Hat Enterprise Linux 5 Security
> Guide for all to review and comment on. (Despite appearances it's not
> supposed to be a valid xml file; I wrote it that way for my own
> convenience.) As mentioned in the Scope Statement (attached), this is the
> integration of the RHEL4 Security Guide and the SELinux Guide. Our focus
> for this release is on accuracy and use cases, at the expense of low-level
> details.
>
> Please feel free to make any suggestions about structure, topics, etc., how
> we could use/enhance this info from other areas (Training?) or vice versa.
>
> I have a few names down for reviewers, authors/editors, etc., (see comments
> in file) but am looking for more. If there is an area where you feel you
> could contribute, please put your hand up. All contributors will be
> acknowledged and included in the colophon, and earn our undying gratitude.
> :-)
>
> cheers
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2006-07-31 1:11 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-07-28 1:51 RHEL5 Security Guide draft TOC for review/comment David O'Brien
2006-07-31 1:11 ` David O'Brien
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.