Case 1: allow any user to run the “cat” command with sudo
- In Segura, in the navigation bar, hover over the Product Menu and select EPM.
- In the side menu, select Policies > Linux > Sudo Rules.
- Click Add.
- On the Segregation screen, choose General.
- On the Register sudo rules form, fill in the fields:
- On the Registration rules for sudo form, on the Main tab, fill in the fields:
- Identification name: define a name to identify the rule.
- Active: check Yes.
- Commands for applying the rule: the full path must be used. Add the path of the
/usr/bin/cat command
. - Should be NOPASSWD?: set to Yes so as not to ask the user to enter their password.
- Description: add a brief description of this rule.
- Click Save.
Case 2: Allow any user to run the “cat” command as sudo on a specific device
- In Segura, in the navigation bar, hover over the Product Menu and select EPM.
- In the side menu, select Policies > Linux > Sudo Rules.
- Click Add.
- On the Segregation screen, choose Devices.
- In the Registration of sudo rules form, fill in the fields:
- On the Registration of sudo rules form, on the Sudo rules tab, fill in the fields:
- Identification name: define a name to identify the rule.
- Active: check Yes.
- Commands for rule application: the full path must be used. Add the command path
/usr/bin/cat.
- Should be NOPASSWD?: set to Yes so as not to ask the user to enter their password.
- Description: add a brief description of this rule.
- In the Devices tab, fill in the fields:
- Click Add to open the Devices modal.
- In the Devices modal, select the devices you want to include in the rule.
- Click Add.
- Click Continue.
- On the Review tab, review the rule registration and click Save.
Case 3: Creating a DAC Permission Access Policy
- In Segura, hover over the Product Menu in the navigation bar and select EPM.
- In the sidebar menu, select Policies > Linux > Policies.
- Click Add to be directed to the policy selection screen.
- On the Segregation screen, select the policy type, in this case, General.
- In the Access Policy Registration form, fill in:
- On the General tab:
- Policy name: name for rule identification.
- Active: set to Yes.
- Directive: select Execute binary.
- Verifier (path or executor): write the command
path="/bin/(app directory)" path.perm=(execution mask number) path.perm=(user group/user)
. - Enable auditing?: enables auditing of policy actions. The field is mandatory and is active by default.
- Include general negotiation rule?: allows only registered rules and denies what is not in the rule.
- Allow or block: fill in whether the registered policy allows or blocks access for the user or group.
- Rule text: fill in with a rule in the format of policies in CaitSith. For example,
task.gid=(group name)
ortask.uid=(user name)
. - Click Add for each rule created.
- To add a new rule, click Add and fill in the table fields.
- Allow or block: choose whether the registered policy allows or blocks access for the user or group.
- Rule text: fill in with a rule in the format of policies in CaitSith. For example, for users:
task.uid="user"
. For groups:task.gid="group"
. It is necessary to use the user's primary group. - Click Continue.
- Select the Review tab.
- Review the information about the rule and, if everything is correct, click Save.
The system displays a confirmation message: "Success. Data saved successfully". The created rule will be in the report list accessible at EPM > Policies > Linux > Policies.