Example Policy Configuration: Security Objectives
-
Protect kernel integrity, including boot files, kernel modules,
sysctl variables
-
Protect integrity of system software, configuration files, and
logs
-
Protect administrator role and domain
-
Confine system processes and privileged programs
-
Protect against execution of malicious software