Application Armor (AppArmor) is security software just like SELinux. It is currently maintained by Novell and available under Suse Linux enterprise server.
Why use AppArmor (or SELinux) mandatory access control?
Both of these provide a protection against zero-day security flaw. The security flaw allows an attacker to execute any code on server. If AppArmor or SELinux is enabled it will protect Linux applications (such as httpd/squid/ssjhd) from such code.
I found SELinux bit hard to manage and some time it breaks the system. These instructions seem quite easy to me. Christian Boltz explains how to use the YaST AppArmor modules or the command-line tools to secure your server using AppArmor.
From the article:
If you want to secure your server using AppArmor, you have to create and modify the profiles for all the applications you use. This can easily be done using the YaST AppArmor modules or the command-line tools.
The YaST modules are more or less self-explaining, but more for mouse users – and you should never have a mouse attached to your server 😉
Therefore I’ll explain the command-line tools a bit. I’ll also explain some AppArmor basics when needed.
Also note that AppArmor packages exists for:
- Slackware Linux
- Debian Linux
- Ubuntu Linux etc.
PS: These tools are not silver bullet but provide little more isolation and makes crackers life littler harder 🙂
|Category||List of Unix and Linux commands|
|Firewall||Alpine Awall • CentOS 8 • OpenSUSE • RHEL 8 • Ubuntu 16.04 • Ubuntu 18.04 • Ubuntu 20.04|
|Network Utilities||dig • host • ip • nmap|
|OpenVPN||CentOS 7 • CentOS 8 • Debian 10 • Debian 8/9 • Ubuntu 18.04 • Ubuntu 20.04|
|Package Manager||apk • apt|
|Processes Management||bg • chroot • cron • disown • fg • jobs • killall • kill • pidof • pstree • pwdx • time|
|Searching||grep • whereis • which|
|User Information||groups • id • lastcomm • last • lid/libuser-lid • logname • members • users • whoami • who • w|
|WireGuard VPN||CentOS 8 • Debian 10 • Firewall • Ubuntu 20.04|