LSM stacking (again)
LSM stacking (again)
Posted Jun 24, 2010 15:05 UTC (Thu) by Cyberax (✭ supporter ✭, #52523)In reply to: LSM stacking (again) by raven667
Parent article: LSM stacking (again)
Why?
I see that we can broadly divide LSM hooks into: filesystem, network, CPU resources, misc.
So we can specify: "First use AppArmor to check filesystem access, but use SeLinux to check security labels on network packets".
