Others LOMAC LOMAC implements MAC integrity protection based on the Low Water-Mark model using Linux loadable kernel modules. Its a bit different from the other security products, as there is no configuration required, nor are there any kernel patches or modifications to existing files. LOMAC divides the system into two conceptual levels of integrity, high and low. Access control is based on integrity level and not on user identity. System binaries, configuration files, and kernel servers are placed in the high level, and user-interacting daemons are relegated to low levels.