[OT][Practices] The Case for RBAC/MAC -- WAS: SELinux threads, cynicism, one-upmanship, etc.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Chris Mauritz <chrism@xxxxxxxxx> wrote:
> SELinux shouldn't be turned on by default and in many cases
> simply creates extra overhead/bloat on a system that
doesn't
> really need it. 

Okay, I give.  I would like people to quantity/quality
"doesn't really need it."  I've really "bit my lip" on this
since just after the early stuff, but it keeps coming up over
and over.

Frankly, I have to join in the viewpoint of others who run
some serious IT operations.  People who don't see the value
in RBAC/MAC are just ... and I'm sorry I have to say it this
way ... "naive"?

It's more than just CC EAL certification.  It's about
defense-in-depth.

> Building a firewall?

But how many filters these day are no longer just doing
layer-2 frame, layer-3 IP or NAT and layer-4 service/PAT? 
They are now doing proxying at the layer-5/6/7 session,
presentation and application filtering?  Those are
intelligent filters, a running service, and they need to be
contained at the kernel.

> Building a hardened box that's going to be exposed to the
net 
> at a datacenter?

RBAC/MAC is not just for Internet exposed systems.  If you
honestly aren't applying a set of defense-in-depth of several
layers in a SMB or later, then you're really ignoring a lot. 
RBAC/MAC is just as important for internally exposed systems
-- private networks between companies, VPN clients from
off-site who might be compromised, etc...  It's about keeping
out the unexpected.

Having some kernel-level RBAC/MAC saved me about 40 hours of
work when someone put the wrong data on the wrong network.  I
could show, _in_detail_, how far that data reached into my
network, and where the data did not go.  Now that's just
auditing.

Let's talk about a compromise of a partner company -- one
that had certain privilege access to some of my systems.  2
sets of internal firewalls, totally bypassed because the
access by that system was legit to the layer-2-4 packet
inspection!  They got into my system with that privileged
access, but thanx to RBAC, they couldn't run but a few
binaries and access a few files!

[ NOTE:  The system wasn't Linux. ;-]

> Great, then it might be worth your while to wrestle with it
> and take the time to figure out why it's breaking your 
> applications.

That's what I have to do everytime I put in a layer-2-4
packet inspector that denies _all_ traffic by default, or
when I put in HTML/XML layer-7 gateways for richer services. 
Now I'm just doing it at the application server itself --
guaranteeing that some services can't be used to access areas
of the box, possible the rest of the subnet (c/o that box),
thanx to RBAC/MAC.

> All the really good SAs I've ever had, tended to be
somewhat
> frugal with their time and tended not to waste it on things

> they didn't absolutely need or that didn't somehow make
> their lives easier.

Making their lives easier is the problem.  Far too often
people get something to work and leave it.  Or they blindly
believe something is secure -- especially a layer-7 service
by a layer-2-4 stateful packet inspector.

The effort put forth in an environment that calls for
RBAC/MAC is well worth the reduced headaches.  Net-facing or
non-net-facing.  Heck, having a physical connection to
anything is the root problem -- no matter how many filters
things go through, there is always a way!  And I've seen it
too!



-- 
Bryan J. Smith                | Sent from Yahoo Mail
mailto:b.j.smith@xxxxxxxx     |  (please excuse any
http://thebs413.blogspot.com/ |   missing headers)

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux