1.12 Audit Docker files and directories - /usr/bin/docker-containerd

Information

Audit /usr/bin/docker-containerd, if applicable.

Rationale:

Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with 'root' privileges. Its behavior depends on some key files and directories. /usr/bin/docker-containerdis one such file. Docker now relies on containerd and runCto spawn containers. It must be audited, if applicable.

Solution

Add a rule for/usr/bin/docker-containerdfile.

For example,

Add the line as below in /etc/audit/audit.rules file:

-w /usr/bin/docker-containerd -k docker

Then, restart the audit daemon. For example,

service auditd restart

Impact:

Auditing generates quite big log files. Ensure to rotate and archive them periodically. Also, create a separate partition of audit to avoid filling root file system.

Default Value:

By default, Docker related files and directories arenot audited.The file /usr/bin/docker-containerdmay not be available on the system. In that case, this recommendation is not applicable.

See Also

https://workbench.cisecurity.org/files/1476

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c.

Plugin: Unix

Control ID: 2388a029c83c51dd7a99c5650c354a7231d490bb52c3a52863036ab4b7db50b4