DKER-EE-005230 - Docker Enterprise registry certificate file ownership must be set to root:root.

Information

Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) are owned and group-owned by root.

/etc/docker/certs.d/<registry-name> directory contains Docker registry certificates. These certificate files must be owned and group-owned by root to maintain the integrity of the certificates.

By default, the ownership and group-ownership for registry certificate files is correctly set to root.

Solution

Set the ownership and group-ownership for the registry certificate files to root.

Run the following command:
chown root:root /etc/docker/certs.d/<registry-name>/*

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-Unix_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-235857r961863_rule, STIG-ID|DKER-EE-005230, STIG-Legacy|SV-104889, STIG-Legacy|V-95751, Vuln-ID|V-235857

Plugin: Unix

Control ID: 04d8885f251f423bb34cb0638c23d025e76611c1968644493b39d5e0ed306f3e