UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Docker Enterprise docker.socket file ownership must be set to root:root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-95743 DKER-EE-005190 SV-104881r1_rule High
Description
Verify that the docker.socket file ownership and group ownership is correctly set to root. docker.socket file contains sensitive parameters that may alter the behavior of Docker remote API. Hence, it should be owned and group-owned by root to maintain the integrity of the file. This file may not be present on the system. In that case, this recommendation is not applicable. By default, if the file is present, the ownership and group-ownership for this file is correctly set to root.
STIG Date
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide 2019-09-13

Details

Check Text ( C-94573r1_chk )
Ensure that docker.socket file ownership is set to root:root.

Step 1: Find out the file location:

systemctl show -p FragmentPath docker.socket

Step 2: If the file does not exist, this is not a finding. If the file exists, execute the below command with the correct file path to verify that the file is owned and group-owned by root.

Example:
stat -c %U:%G /usr/lib/systemd/system/docker.socket | grep -v root:root

If the above command returns nothing, this is not a finding. If the command returns non root:root file permissions, this is a finding.
Fix Text (F-101411r1_fix)
Step 1: Find out the file location:

systemctl show -p FragmentPath docker.socket

Step 2: If the file exists, execute the below command with the correct file path to set the ownership and group ownership for the file to root.

Example:
chown root:root /usr/lib/systemd/system/docker.socket