Close Menu
Linux All DayLinux All Day
    Facebook Bluesky Mastodon X (Twitter)
    Linux All DayLinux All Day
    • News
    • Operating Systems
      • Linux Distributions
      • Android-based OS
      • ChromeOS Alternatives
    • Software
      • Apps & Tools
      • Desktop Environments
      • Installation & Management
    • Tutorials
      • Linux Basic & Tips
      • System Optimization
      • Security & Privacy
    • Linux Gaming
      • Game News & Reviews
      • Emulators & Retro
      • Performance & Benchmarks
    • Comparisons
    Mastodon Bluesky Facebook
    Linux All DayLinux All Day
    Home - Tutorials - Security & Privacy - What is AppArmor and Which Linux Distros Use It?

    What is AppArmor and Which Linux Distros Use It?

    By Mitja Security & Privacy November 2, 20255 Mins Read
    Share Facebook Bluesky Twitter Threads Reddit LinkedIn Telegram Tumblr Email Copy Link Pinterest
    Follow Us
    Facebook Mastodon Bluesky X (Twitter)
    A graphic showing the AppArmor logo (a knight's helmet) protecting applications on a Linux system from threats.
    Share
    Facebook Twitter Bluesky Reddit Threads Tumblr Email Copy Link

    When you dive into the world of Linux, you quickly hear about its robust security. One of the key components protecting many Linux systems is AppArmor, which stands for Application Armor. While it runs silently in the background, this powerful security module is a critical defense layer.

    But what is AppArmor, how does it differ from its famous cousin SELinux, and most importantly, is it running on your system? Let’s break down this essential Linux security feature.

    What is AppArmor? A “Profile” Based Approach to Security

    AppArmor is a Mandatory Access Control (MAC) system. This is a fancy term for a security model that confines programs to a limited set of resources, based on rules set by the administrator (or, more commonly, by your distribution’s maintainers).

    Think of it like this: A standard Linux system uses Discretionary Access Control (DAC), which is based on user permissions. If you run a program (like Firefox), that program runs with all of your user permissions. If a hacker finds a vulnerability in Firefox, they could potentially access all your personal files (documents, photos, SSH keys) because you have access to them.

    AppArmor prevents this. It works on a path-based profile system. Each application gets a “profile” that defines exactly what it is allowed to do.

    A simplified Firefox profile might say:

    • Allow reading/writing to ~/.mozilla/firefox/ (its own settings).
    • Allow reading/writing to your ~/Downloads/ folder.
    • Allow access to network connections.
    • DENY access to ~/.ssh/ (your secure keys).
    • DENY access to /etc/passwd (system user list).

    If a hacker exploits Firefox and tries to read your id_rsa SSH key, AppArmor will intercept the request and block it, because the action is outside the “profile.”

    Enforce vs. Complain Mode

    AppArmor profiles operate in two main modes:

    1. Enforce Mode: This is the default for active profiles. AppArmor actively blocks any action that violates the profile’s rules.
    2. Complain Mode: This mode is for testing. AppArmor logs all violations but does not block them. This allows developers to see what a program needs to do before locking it down.

    You can easily check the status of AppArmor on your system with the command:

    Bash

    sudo aa-status
    

    This will show you how many profiles are loaded and how many are in “enforce” or “complain” mode.

    Which Linux Distros Use AppArmor by Default in 2025?

    This is the key question for most users. While its main rival, SELinux, is the default for the Red Hat (Fedora, RHEL) family, AppArmor is the default security standard for several other major distributions.

    As of late 2025, the primary distributions that enable AppArmor out of the box are:

    • Ubuntu (and all its derivatives): This is the biggest user of AppArmor. If you use Ubuntu, Kubuntu, Linux Mint, Zorin OS, Pop!_OS, or any other Ubuntu-based distro, you are already using AppArmor. It’s a core part of their security strategy.
    • openSUSE (Leap and Tumbleweed): openSUSE has been a long-time user and major contributor to AppArmor. It comes fully configured and enabled by default.
    • Debian: Starting with Debian 10 “Buster,” AppArmor is now the default MAC system, replacing the old fragmented system. This means all modern Debian installs are protected by it.

    What about other distros?

    • Arch Linux: AppArmor is not enabled by default, but it is fully supported and available in the official repositories. Users who want it must install it and enable it in the kernel boot parameters.
    • Fedora / RHEL / AlmaLinux / Rocky Linux: These distributions use SELinux by default. It is technically possible, but highly discouraged, to run AppArmor on these systems, as it would require disabling SELinux first.

    The Big Question: AppArmor vs. SELinux

    You cannot talk about AppArmor without mentioning SELinux. They both aim to do the same thing (provide MAC) but in very different ways.

    FeatureAppArmorSELinux (Security-Enhanced Linux)
    Core MethodPath-based. Profiles are tied to program executables (e.g., /usr/bin/firefox).Label-based. Every single file, process, and port on the system gets a security “label” (context).
    ComplexityEasier. Profiles are text files that are relatively easy to read and write by humans.Very Complex. Requires a steep learning curve. Policies are intricate and manage the entire system.
    GranularityLess granular. It’s hard to distinguish between two files in the same directory.Extremely granular. Can define rules like “this web server process can only write to log files labeled httpd_log_t.”
    Best For…Desktops, simple servers, and protecting specific applications.High-security environments, multi-user servers, and systems where “deny-all” is the priority (e.g., military, finance).

    In short, AppArmor is generally considered easier to manage and more “user-friendly,” making it a perfect choice for desktop distributions like Ubuntu and openSUSE. SELinux is more powerful but significantly more complex, making it the standard for enterprise-focused distros like RHEL.

    For a deeper dive, you can check out the official APPARMOR PROJECT PAGE or SELINUX PROJECT WIKI

    Do you feel more secure knowing AppArmor is running on your Ubuntu or openSUSE system? Or are you a Fedora user who prefers the granular control of SELinux? Share your security preferences and experiences in the comments below!

    Follow on Mastodon Follow on Bluesky
    Share. Facebook Twitter Bluesky Reddit Threads Telegram Email Copy Link

    Related post

    How to Install ClamAV on openSUSE (Leap & Tumbleweed)

    November 13, 2025

    How to Install ClamAV on Arch Linux & Use the ClamTK GUI

    November 13, 2025

    How to Install ClamAV on Debian/Ubuntu & Use the ClamTK GUI

    November 13, 2025
    Leave A Reply Cancel Reply

    → Switch to Linux Today
    • Facebook
    • Twitter
    • Mastodon
    • Bluesky
    More From Linuxallday
    Beyond the Grid: Mastering the Zen Flow of Bryce Tiles
    Mozilla Confirms Full “AI Kill Switch” for Firefox, Arriving in Early 2026
    Rescuezilla Review 2025: The ‘Undo Button’ for Your Entire PC
    Tails OS Review 2025: The Ultimate Amnesic System for Total Privacy
    Facebook X (Twitter) Mastodon Bluesky Threads RSS
    • About Us
    • Cookie Policy
    • Terms & Conditions
    • Privacy Policy
    • Disclosure & Disclaimer
    • Contact
    • Our Authors
    • Cookie Policy (EU)
    © 2026 Designed by FeedCrux

    Type above and press Enter to search. Press Esc to cancel.

    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}