
The simplest method to ensure that your security policy files are regularly backed
up is to include the directory
/etc/apparmor.d
in the list of directories that
your backup system archives.
2
You can also use
scp
or a file manager like Konqueror or Nautilus to store the
files on some kind of storage media, the network, or another computer.
27.6.2 Changing Your Security Profiles
Maintenance of security profiles includes changing them if you decide that your system
requires more or less security for its applications. To change your profiles in Novell
AppArmor, refer to
Section 23.3, “Editing Profiles”
(page 275).
27.6.3 Introducing New Software into Your
Environment
When you add a new application version or patch to your system, you should always
update the profile to fit your needs. You have several options that depend on your
company's software deployment strategy. You can deploy your patches and upgrades
into a test or production environment. The following explains how to do this with each
method.
If you intend to deploy a patch or upgrade in a test environment, the best method for
updating your profiles is one of the following:
• Run the profiling wizard by selecting Add Profile Wizard in YaST. This creates a
new profile for the added or patched application. For step-by-step instructions, refer
to
Section 23.1, “Adding a Profile Using the Wizard”
(page 267).
• Run aa-genprof by typing
aa-genprof
in a terminal while logged in as
root
.
For detailed instructions, refer to
Section “aa-genprof—Generating Profiles”
(page 297).
If you intend to deploy a patch or upgrade directly into a production environment, the
best method for updating your profiles is one of the following:
Managing Profiled Applications
355
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......