<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Mandatory-Access-Control on Pi Stack</title>
    <link>https://www.pistack.xyz/tags/mandatory-access-control/</link>
    <description>Recent content in Mandatory-Access-Control on Pi Stack</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 28 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.pistack.xyz/tags/mandatory-access-control/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Self-Hosted AppArmor Management Tools — aa-genprof vs aa-logprof vs AppArmor Utils</title>
      <link>https://www.pistack.xyz/posts/2026-05-28-self-hosted-apparmor-management-tools-aagenprof-aalogprof-utils-guide/</link>
      <pubDate>Thu, 28 May 2026 00:00:00 +0000</pubDate>
      <guid>https://www.pistack.xyz/posts/2026-05-28-self-hosted-apparmor-management-tools-aagenprof-aalogprof-utils-guide/</guid>
      <description>&lt;p&gt;AppArmor is a Linux Security Module (LSM) that implements mandatory access control (MAC) through per-program profiles. Unlike SELinux, which uses a centralized policy language, AppArmor attaches security profiles directly to executable paths, making it more intuitive for system administrators. However, writing and managing AppArmor profiles manually is complex. Several tools simplify profile creation, enforcement, and auditing.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
