<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Policy-Management on Pi Stack</title>
    <link>https://www.pistack.xyz/tags/policy-management/</link>
    <description>Recent content in Policy-Management on Pi Stack</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 24 May 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.pistack.xyz/tags/policy-management/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Self-Hosted SELinux Management Tools: semanage vs setools vs audit2allow (2026)</title>
      <link>https://www.pistack.xyz/posts/2026-05-24-self-hosted-selinux-management-tools-semanage-setools-audit2allow-guide/</link>
      <pubDate>Sun, 24 May 2026 00:00:00 +0000</pubDate>
      <guid>https://www.pistack.xyz/posts/2026-05-24-self-hosted-selinux-management-tools-semanage-setools-audit2allow-guide/</guid>
      <description>&lt;p&gt;SELinux (Security-Enhanced Linux) is one of the most powerful mandatory access control frameworks available for Linux systems. While the kernel enforces policies, managing those policies effectively requires the right tooling. For self-hosted server administrators, choosing the correct SELinux management tools can mean the difference between a secure, well-tuned system and one that&amp;rsquo;s either locked down too tightly or dangerously permissive.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
