Enforcement policies
No profile for an executing binary. No control.
There is a profile for an executing binary. The profile's access controls are enforced.
Processes: default allow
Processes are not by default bound to profiles.
Bounding is required before executing a file.
Enabled by writing “exec profile_name” at
/proc/self/attr/apparmor
Binding a profile to an application with a specific profile can be done with aa-exec.
Profiles: default deny (whitelisting)
When a profile is used, everything is denied by default.
Exceptions must be explicitly allowed by the profile.
However, there are exceptions (e.g. rlimits).
Last updated