Learning Pathways
Getting Started
The core security model — start here. Understand how identity and access control work on Peios.
8 articlesComing from Linux
How Peios relates to Linux identity and access control — UIDs, root, capabilities, and compatibility.
3 articlesTroubleshooting
Diagnosing access denials, broken inheritance, missing audit events, and other common issues.
3 articlesBuilding Services
For developers writing services that handle client identity.
8 articlesElevation and Authority
How privilege levels, integrity, and elevation control what processes can do.
9 articlesManaging Permissions
Practical day-to-day permission management — inspecting, setting, and troubleshooting access.
12 articlesPolicy and Compliance
Attribute-based access control, central policy, and auditing at organizational scale.
8 articlesSecuring Services
Defense in depth — how to protect critical services from compromise.
12 articles