STIGQter STIGQter: STIG Summary: Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.

DISA Rule

SV-235779r627464_rule

Vulnerability Number

V-235779

Group Title

SRG-APP-000016

Rule Version

DKER-EE-001090

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This fix applies to the underlying host operating system on which the Docker Engine - Enterprise instance is running.

Enable and configure audit policies for Docker Engine - Enterprise on the host operating system:

(Linux) Check that auditd has been installed, and add the following rules to /etc/audit/audit.rules:

auditctl -w /usr/bin/docker -k
auditctl -w /var/lib/docker -k docker
auditctl -w /etc/docker -k docker
auditctl -w [docker.service-path] -k docker (where [docker.service-path] is the result of systemctl show -p FragmentPath docker.service)
auditctl -w [docker.socket-path] -k docker (where [docker.socket-path] is the result of systemctl show -p FragmentPath docker.socket)
auditctl -w /etc/default/docker -k docker
auditctl -w /etc/docker/daemon.json
auditctl -w /usr/bin/docker-containerd -k docker
auditctl -w /usr/bin/docker-runc -k docker

Check Contents

This check only applies to the underlying host operating system on which the Docker Engine - Enterprise instance is running.

Verify that the auditing capabilities provided by the underlying host have been properly configured to audit Docker Engine - Enterprise:

(Linux) Check that auditd has been installed and that audit rules are configured against the following components of Docker Engine - Enterprise:

auditctl -l | grep -e /usr/bin/docker -e /var/lib/docker -e /etc/docker -e /etc/default/docker -e /etc/docker/daemon.json -e /usr/bin/docker-containerd -e /usr/bin/docker-runc

systemctl show -p FragmentPath docker.service or auditctl -l | grep docker.service
systemctl show -p FragmentPath docker.socket or auditctl -l | grep docker.sock

If audit rules aren't properly configured for the paths and services listed above, then this is a finding.

Vulnerability Number

V-235779

Documentable

False

Rule Version

DKER-EE-001090

Severity Override Guidance

This check only applies to the underlying host operating system on which the Docker Engine - Enterprise instance is running.

Verify that the auditing capabilities provided by the underlying host have been properly configured to audit Docker Engine - Enterprise:

(Linux) Check that auditd has been installed and that audit rules are configured against the following components of Docker Engine - Enterprise:

auditctl -l | grep -e /usr/bin/docker -e /var/lib/docker -e /etc/docker -e /etc/default/docker -e /etc/docker/daemon.json -e /usr/bin/docker-containerd -e /usr/bin/docker-runc

systemctl show -p FragmentPath docker.service or auditctl -l | grep docker.service
systemctl show -p FragmentPath docker.socket or auditctl -l | grep docker.sock

If audit rules aren't properly configured for the paths and services listed above, then this is a finding.

Check Content Reference

M

Target Key

5281

Comments