DKER-EE-005250 - Docker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.

Information

Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) is owned and group-owned by root.

The TLS CA certificate file should be protected from any tampering. It is used to authenticate Docker server based on given CA certificate. Hence, it must be owned and group-owned by root to maintain the integrity of the CA certificate.
By default, the ownership and group-ownership for TLS CA certificate file is correctly set to root.

Solution

Set the ownership and group-ownership for the TLS CA certificate file to root.

Run the following command:
chown root:root <path to TLS CA certificate file>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-Unix_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-235859r961863_rule, STIG-ID|DKER-EE-005250, STIG-Legacy|SV-104893, STIG-Legacy|V-95755, Vuln-ID|V-235859

Plugin: Unix

Control ID: 133626954d411ada935d107a4c02873340b6b1957007a4d95351a0e943bb6fff