DKER-EE-005180 - Docker Enterprise docker.service file permissions must be set to 644 or more restrictive.

Information

Verify that the docker.service file permissions are correctly set to 644 or more restrictive.

docker.service file contains sensitive parameters that may alter the behavior of Docker daemon. Hence, it should not be writable by any other user other than root to maintain the integrity of the file.

This file may not be present on the system. In that case, this recommendation is not applicable. By default, if the file is present, the file permissions are correctly set to 644.

Solution

Step 1: Find out the file location:

systemctl show -p FragmentPath docker.service

Step 2: If the file exists, execute the below command with the correct file path to set the file permissions to 644.

Example:
chmod 644 /usr/lib/systemd/system/docker.service

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-Unix_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-235852r961863_rule, STIG-ID|DKER-EE-005180, STIG-Legacy|SV-104879, STIG-Legacy|V-95741, Vuln-ID|V-235852

Plugin: Unix

Control ID: 517c957342b84b848164edb6c59f0f4067ea3bb8f81ceaa003ab394db3684e8f