DKER-EE-005210 - Docker Enterprise /etc/docker directory ownership must be set to root:root - CentOS/RHEL

Information

Verify that the /etc/docker directory ownership and group-ownership is correctly set to root.

/etc/docker directory contains certificates and keys in addition to various sensitive files. Hence, it should be owned and group-owned by root to maintain the integrity of the directory.

By default, the ownership and group-ownership for this directory is correctly set to root.

Solution

Set the ownership and group-ownership for the directory to root.

On CentOS host OS's, execute the following command:
chown root:root /etc/docker

On Ubuntu host OS's, execute the following command:
chown root:root /etc/default/docker

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-Unix_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-235855r961863_rule, STIG-ID|DKER-EE-005210, STIG-Legacy|SV-104885, STIG-Legacy|V-95747, Vuln-ID|V-235855

Plugin: Unix

Control ID: cb09f683677b47f62d7afaa4a736470354f26f8252d6a7f907507e6850b7f1ce