Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Install upstream apparmor profiles in sd-svs-disp #384

Closed
emkll opened this issue Dec 20, 2019 · 0 comments · Fixed by freedomofpress/securedrop-builder#118
Closed

Install upstream apparmor profiles in sd-svs-disp #384

emkll opened this issue Dec 20, 2019 · 0 comments · Fixed by freedomofpress/securedrop-builder#118

Comments

@emkll
Copy link
Contributor

emkll commented Dec 20, 2019

(initially reported in #234 (comment))
We have a large number of applications installed in sd-svs-disp, and many of them have community maintained apparmor profiles (apparmor-utils, apparmor-profiles, apparmor-profiles-extra). This will ensure these applications will only access system functionality or files that are strictly required, when opening potentially malicious submission. This will provide further assurances and defense in depth.

While it would be nice-to-have in other VMs as well, I think the priority would be having these in sd-svs-disp vms.

@emkll emkll added the security label Dec 20, 2019
@emkll emkll added this to the 0.2.0beta milestone Dec 20, 2019
@emkll emkll changed the title Audit and install upstream apparmor profiles in sd-svs-disp Install upstream apparmor profiles in sd-svs-disp Dec 20, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant