Security Basics

User ACL Patterns with Extended Attributes

Layer POSIX ACLs without hiding ownership problems, and document decisions future-you will understand.

Live online 2 weeks · 9 lab hours Intermediate

390,000 KRW informational until enrollment confirms

Printed ACL matrix clipped beside a laptop

Program narrative

Labs mix NFSv4 quirks with local ext4 ACLs. You practice denying the temptation to chmod -R 777 when deadlines press, and instead draft stakeholder notes that buy time.

What the labs include

  • getfacl/setfacl rhythm exercises
  • Default ACL inheritance traps
  • NFSv4 idmap gotchas on classroom filers
  • Snapshot before ACL blast radius changes
  • Audit log correlation with access denials
  • Template for application owner sign-off
  • Pair review on readability of ACL matrices

Outcomes you can show a lead

  • Predict inheritance before running setfacl
  • Explain POSIX vs NFSv4 ACL differences calmly
  • Produce a matrix ops can skim during incidents

Straight FAQ

Active Directory?

Mapped conceptually; labs stay Linux-native with sssd hints only.

macOS clients?

Mentioned in closing Q&A, not exercised.

Limitations?

SELinux module authoring is out of scope.

Recent participant notes

“Default ACL trap caught me twice—good pain. Matrix template now lives next to our filer runbook.”

Yejin