STIGQter STIGQter: STIG Summary: Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

Docker Enterprise docker.socket file ownership must be set to root:root.

DISA Rule

SV-235853r627686_rule

Vulnerability Number

V-235853

Group Title

SRG-APP-000516

Rule Version

DKER-EE-005190

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Step 1: Find out the file location:

systemctl show -p FragmentPath docker.socket

Step 2: If the file exists, execute the below command with the correct file path to set the ownership and group ownership for the file to root.

Example:
chown root:root /usr/lib/systemd/system/docker.socket

Check Contents

Ensure that docker.socket file ownership is set to root:root.

Step 1: Find out the file location:

systemctl show -p FragmentPath docker.socket

Step 2: If the file does not exist, this is not a finding. If the file exists, execute the below command with the correct file path to verify that the file is owned and group-owned by root.

Example:
stat -c %U:%G /usr/lib/systemd/system/docker.socket | grep -v root:root

If the above command returns nothing, this is not a finding. If the command returns non root:root file permissions, this is a finding.

Vulnerability Number

V-235853

Documentable

False

Rule Version

DKER-EE-005190

Severity Override Guidance

Ensure that docker.socket file ownership is set to root:root.

Step 1: Find out the file location:

systemctl show -p FragmentPath docker.socket

Step 2: If the file does not exist, this is not a finding. If the file exists, execute the below command with the correct file path to verify that the file is owned and group-owned by root.

Example:
stat -c %U:%G /usr/lib/systemd/system/docker.socket | grep -v root:root

If the above command returns nothing, this is not a finding. If the command returns non root:root file permissions, this is a finding.

Check Content Reference

M

Target Key

5281

Comments