AppArmor learns the behaviors of applications through established access controls (for monitoring and reporting) and enforces application security policies.
Security-Enhanced Linux (SELinux) uses rule-based policy enforcement to restrict the functionality of users and services.
Grsecurity uses Linux Security Modules to enhance security of the Linux kernel.
+ Software supports only blacklisting.
Security-Enhanced Linux (SELinux) uses rule-based policy enforcement to restrict the functionality of users and services.
Grsecurity uses Linux Security Modules to enhance security of the Linux kernel.
Features | AppArmor | SELinux | Grsecurity |
---|---|---|---|
Allow/Deny Policy | Yes | Yes | Yes |
Hierarchical Domains | Yes | Yes | Yes |
Object Types | Yes | Yes | Yes |
Data Types | No | No | No |
Account Management | No | Yes | Yes |
Service Management | No | Yes | Yes |
Network Management | No* | Yes | Yes |
Access Control Lists | Yes | Yes | Yes |
Role-Based Access Control | Yes | Yes | Yes |
Security Context | No | Yes | No |
Linux Kernel Module | Yes | Yes | Yes |
Language | No | Yes | Yes |
Unified Configuration | Yes | No | No |
Doesn't Prohibit Other Applications & Tools | Yes | No | No |
No Installation | No | No | No |
Few Dependencies | Yes | No | Yes |
Automated Execution | Yes | Yes | Yes |
Learning Mode | Yes | No | Yes |
Self-Managed (no framework, no user interaction) | Yes | No | No |
Self-Healing (restorative, no user interaction) | No | No | No |
Application Programming Interface | No | Yes | No |
Remote Access Control | No | No | No |
Intrusion Detection System | Yes | Yes | Yes |
Logging | Yes | Yes | Yes |
Report Generation | Yes | Yes | No |
Intrusion Prevention System | Yes | No | No |
Malware Protection | Yes | Yes+ | Yes+ |
Updated Signature Scanning & Analysis | No | No | No |
Deep Packet Inspection (DPI) | No | No | No |
+ Software supports only blacklisting.
Do you have a suggestion about how to improve this blog? Let's talk about it. Contact me at David.Brenner.Jr@Gmail.com or 720-584-5229.
Comments
Post a Comment
Comments to this blog will be reviewed within 72 hours. No trolling please