|
19 | 19 | <para> |
20 | 20 | Linux increases its security by separating privileges between individual components of the |
21 | 21 | operating system. System services already have a default level of security. For example, |
22 | | - their processes run under their own user ID, which limits the changes they can perform on the |
23 | | - system. |
| 22 | + their processes run under their own user ID, which limits the changes they can perform on |
| 23 | + the system. |
24 | 24 | </para> |
25 | 25 |
|
26 | 26 | <para> |
27 | 27 | The default level of privilege separation provides only a basic protection. Services can |
28 | | - still perform as many changes as normal local users, though not as many as &rootuser;. |
29 | | - A higher level of system security requires limiting what services can perform and prevents |
| 28 | + still perform as many changes as normal local users, though not as many as &rootuser;. A |
| 29 | + higher level of system security requires limiting what services can perform and prevents |
30 | 30 | them from certain privileges that normal users are allowed to use. |
31 | 31 | </para> |
32 | 32 | </abstract> |
|
36 | 36 | <title>How does securing services with &systemd; work?</title> |
37 | 37 | <para> |
38 | 38 | There are several methods to secure processes and applications that you can use |
39 | | - simultaneously. For example, confining with &selnx; or &aa; is recommended. &systemd; can |
40 | | - apply additional restrictions to local services by using technologies included in the kernel. |
41 | | - These restrictions are activated by adding specific options to the &systemd; service |
42 | | - definition and restarting the service. |
| 39 | + simultaneously. For example, confining with &selnx; <phrase os="sles">or &aa; </phrase>is |
| 40 | + recommended. &systemd; can apply additional restrictions to local services by using |
| 41 | + technologies included in the kernel. These restrictions are activated by adding specific |
| 42 | + options to the &systemd; service definition and restarting the service. |
43 | 43 | </para> |
44 | 44 | </section> |
45 | 45 | <section xml:id="benefits-securing-with-systemd"> |
|
49 | 49 | sensitive data contained on its file system. |
50 | 50 | </para> |
51 | 51 | </section> |
52 | | - <section xml:id="related-securing-with-systemd"> |
53 | | - <title>Related topics</title> |
54 | | - <itemizedlist> |
55 | | - <listitem> |
56 | | - <para> |
57 | | - All security options are described in &systemd;'s man pages. Refer to <command>man 5 |
58 | | - systemd.exec</command>. |
59 | | - </para> |
60 | | - </listitem> |
61 | | - <listitem> |
62 | | - <para> |
63 | | - The list of currently defined kernel capabilities is available in <command>man 7 |
64 | | - capabilities</command>. |
65 | | - </para> |
66 | | - </listitem> |
67 | | - <listitem> |
68 | | - <para> |
69 | | - Enabling and disabling &systemd; services is described in |
70 | | - <link xlink:href="https://documentation.suse.com/smart/linux/html/reference-systemctl-enable-disable-services/reference-systemctl-enable-disable-services.html"/>. |
71 | | - </para> |
72 | | - </listitem> |
73 | | - <listitem> |
74 | | - <para> |
75 | | - Managing &systemd; targets with <command>systemctl</command> is described in |
76 | | - <link xlink:href="https://documentation.suse.com/smart/linux/html/reference-managing-systemd-targets-systemctl/reference-systemctl-managing-targets.html"/>. |
77 | | - </para> |
78 | | - </listitem> |
79 | | - <listitem> |
80 | | - <para> |
81 | | - Sending termination signals to &systemd; services is described in |
82 | | - <link xlink:href="https://documentation.suse.com/smart/linux/html/task-send-termination-signals-systemd/task-send-termination-signals-systemd.html"/>. |
83 | | - </para> |
84 | | - </listitem> |
85 | | - <listitem> |
86 | | - <para> |
87 | | - Starting and stopping &systemd; services is described in |
88 | | - <link xlink:href="https://documentation.suse.com/smart/linux/html/reference-systemctl-start-stop-services/reference-systemctl-start-stop-services.html"/>. |
89 | | - </para> |
90 | | - </listitem> |
91 | | - </itemizedlist> |
92 | | - </section> |
93 | 52 | </topic> |
0 commit comments