DKER-EE-005190 - Docker Enterprise docker.socket file ownership must be set to root:root.

Information

Verify that the docker.socket file ownership and group ownership is correctly set to root.

docker.socket file contains sensitive parameters that may alter the behavior of Docker remote API. Hence, it should be owned and group-owned by root to maintain the integrity of the file.

This file may not be present on the system. In that case, this recommendation is not applicable. By default, if the file is present, the ownership and group-ownership for this file is correctly set to root.

Solution

Step 1: Find out the file location:

systemctl show -p FragmentPath docker.socket

Step 2: If the file exists, execute the below command with the correct file path to set the ownership and group ownership for the file to root.

Example:
chown root:root /usr/lib/systemd/system/docker.socket

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-Unix_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|I, CCI|CCI-000366, Rule-ID|SV-235853r961863_rule, STIG-ID|DKER-EE-005190, STIG-Legacy|SV-104881, STIG-Legacy|V-95743, Vuln-ID|V-235853

Plugin: Unix

Control ID: 7be037bcb2c7dbe7af0083507d50a2c19ee4c134414ff13eebfc076405880eae