AppArmor

Linux kernel security module
title: "AppArmor" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["linux-kernel-features", "linux-security-software"] description: "Linux kernel security module" topic_path: "technology/operating-systems" source: "https://en.wikipedia.org/wiki/AppArmor" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0
::summary Linux kernel security module ::
::data[format=table title="Infobox software"]
| Field | Value |
|---|---|
| name | AppArmor |
| logo | AppArmor logo.svg |
| author | Immunix |
| developer | Originally by Immunix (1998-2005), then by SUSE as part of Novell (2005-2009), and currently by Canonical Ltd (since 2009). |
| released | |
| latest release version | |
| latest release date | |
| repo | |
| programming language | C, Python, C++, sh |
| operating system | Linux |
| genre | Security, Linux Security Modules (LSM) |
| license | GNU General Public License |
| website | |
| :: |
| name = AppArmor | logo = AppArmor logo.svg | screenshot = | caption = | author = Immunix | developer = Originally by Immunix (1998-2005), then by SUSE as part of Novell (2005-2009), and currently by Canonical Ltd (since 2009). | released = | latest release version = | latest release date = | repo = | programming language = C, Python, C++, sh | operating system = Linux | platform = | language = | genre = Security, Linux Security Modules (LSM) | license = GNU General Public License | website =
AppArmor ("Application Armor") is a Linux kernel security module that allows the system administrator to restrict programs' capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. AppArmor supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included in the mainline Linux kernel since version 2.6.36 and its development has been supported by Canonical since 2009.
Details
In addition to manually creating profiles, AppArmor includes a learning mode, in which profile violations are logged, but not prevented. This log can then be used for generating an AppArmor profile, based on the program's typical behavior.
AppArmor is implemented using the Linux Security Modules (LSM) kernel interface.
AppArmor is offered in part as an alternative to SELinux, which critics consider difficult for administrators to set up and maintain.{{cite web | url = https://www.linux.com/training-tutorials/selinux-comprehensive-security-price-usability/ | title = SELinux: Comprehensive security at the price of usability | author = Mayank Sharma | date = 2006-12-11 | access-date = 2023-06-11 | title = Protective armor: Shutting out intruders with AppArmor | author = Ralf Spenneberg | url = https://www.linux-magazine.com/issues/2006/69/protective_armor | date = August 2006 | access-date = 2008-08-02 | publisher = Linux Magazine | archive-url = https://web.archive.org/web/20080821103924/http://linux-magazine.com/issues/2006/69/protective_armor | archive-date = 21 August 2008 | url-status = live}} They also claim that AppArmor requires fewer modifications to work with existing systems. For example, SELinux requires a filesystem that supports "security labels", and thus cannot provide access control for files mounted via NFS. AppArmor is filesystem-agnostic.
Other systems
AppArmor represents one of several possible approaches to the problem of restricting the actions that installed software may take.
The SELinux system generally takes an approach similar to AppArmor. One important difference: SELinux identifies file system objects by inode number instead of path. Under AppArmor an inaccessible file may become accessible if a hard link to it is created. This difference may be less important than it once was, as Ubuntu 10.10 and later mitigate this with a security module called Yama, which is also used in other distributions. SELinux's inode-based model has always inherently denied access through newly created hard links because the hard link would be pointing to an inaccessible inode.
SELinux and AppArmor also differ significantly in how they are administered and how they integrate into the system.
Isolation of processes can also be accomplished by mechanisms like virtualization; the One Laptop per Child (OLPC) project, for example, sandboxes individual applications in lightweight Vserver.
In 2007, the Simplified Mandatory Access Control Kernel was introduced.
In 2009, a new solution called Tomoyo was included in Linux 2.6.30; like AppArmor, it also uses path-based access control.
Availability
AppArmor was first used in Immunix Linux 1998–2003. At the time, AppArmor was known as SubDomain,{{cite web | url = http://www.immunix.org/ | title = Immunix.org: The Source for Secure Linux Components and Platforms | author = WireX Communications, Inc. | date = 2000-11-15 | archive-url = https://web.archive.org/web/20010203215300/http://www.immunix.org/ | archive-date = 2001-02-03}} a reference to the ability for a security profile for a specific program to be segmented into different domains, which the program can switch between dynamically. AppArmor was first made available in SLES and openSUSE and was first enabled by default in SLES 10 and in openSUSE 10.1.
In May 2005 Novell acquired Immunix and rebranded SubDomain as AppArmor and began code cleaning and rewriting for the inclusion in the Linux kernel. From 2005 to September 2007, AppArmor was maintained by Novell. Novell was taken over by SUSE who are now the legal owner of the trademarked name AppArmor. openSUSE Tumbleweed transitioned from AppArmor to SELinux for new installation since 11 February 2025, openSUSE Leap 16 switched to SELinux by default as well. AppArmor is still available as install-time selection for users who prefer it.
AppArmor was first successfully ported/packaged for Ubuntu in April 2007. AppArmor became a default package starting in Ubuntu 7.10, and came as a part of the release of Ubuntu 8.04, protecting only CUPS by default. As of Ubuntu 9.04 more items such as MySQL have installed profiles. AppArmor hardening continued to improve in Ubuntu 9.10 as it ships with profiles for its guest session, libvirt virtual machines, the Evince document viewer, and an optional Firefox profile.
AppArmor was integrated into the October 2010, 2.6.36 kernel release.{{cite web | url = https://lwn.net/Articles/409810 | title = The 2.6.36 kernel is out | author = James Corbet | date = 2010-10-20}}{{cite web | url = http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 | title = Change Log | author = Linus Torvalds | date = 2010-10-20 | url-status = dead | archive-url = https://web.archive.org/web/20110904032047/http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 | archive-date = 2011-09-04}}{{cite web | url = https://kernelnewbies.org/Linux_2_6_36 | title = Linux 2.6.36 | date = 2010-10-20}}{{cite web | url = http://www.linuxplanet.com/linuxplanet/reports/7203/1/ | title = Linux Kernel 2.6.36 Gets AppArmor | author = Sean Michael Kerner | date = 2010-10-20 | access-date = 2010-10-21 | archive-date = 2018-02-03 | archive-url = https://web.archive.org/web/20180203064922/http://www.linuxplanet.com/linuxplanet/reports/7203/1/ | url-status = dead
AppArmor has been integrated to Synology's DSM since 5.1 Beta in 2014.{{cite web | url = https://www.synology.com/de-de/support/beta_dsm_5_1 | archive-url = https://archive.today/20141021080732/https://www.synology.com/de-de/support/beta_dsm_5_1 | url-status = dead | archive-date = October 21, 2014 | title = Release Notes for DSM 5.1 Beta Program
AppArmor was enabled in Solus Release 3 on 2017/8/15.{{cite web | url = https://www.phoronix.com/scan.php?page=news_item&px=Solus-3-Released | title = Solus 3 Linux Distribution Released For Enthusiasts}}
AppArmor is enabled by default in Debian 10 (Buster), released in July 2019.{{cite web | title = New in Buster | url = https://wiki.debian.org/NewInBuster}}
AppArmor is available in the extra repository of Arch Linux.{{cite web | title = Arch Linux - apparmor pkgver-pkgrel (x86_64) | url = https://archlinux.org/packages/extra/x86_64/apparmor/}}
References
References
- [https://www.openhub.net/p/apparmor/analyses/latest/languages_summary The AppArmor: Application Armor Open Source Project on Open Hub: Languages Page]
- "Security/Features - Ubuntu Wiki".
- Vincent Danen. (2001-12-17). "Immunix System 7: Linux security with a hard hat (not a Red Hat)".
- "AppArmor_History · Wiki · AppArmor / apparmor".
- {{US trademark. 78876817
- Gompa, Neal. (2025-02-13). "Re: Announcement: SELinux as default MAC system on new Tumbleweed installations - openSUSE Factory".
- DeMaio, Douglas. (2025-02-13). "Tumbleweed Adopts SELinux as Default".
- "SecurityTeam/KnowledgeBase/AppArmorProfiles – Ubuntu Wiki".
::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::