UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Docker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-95777 DKER-EE-005360 SV-104915r1_rule High
Description
Verify that the /etc/default/docker file permissions are correctly set to 644 or more restrictive. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daemon. Hence, it should be writable only by root to maintain the integrity of the file. This file may not be present on the system. In that case, this recommendation is not applicable.
STIG Date
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide 2019-09-13

Details

Check Text ( C-94607r1_chk )
This requirement applies to Ubuntu Linux systems only.

Ensure that /etc/default/docker file permissions are set to 644 or more restrictive.

Execute the below command to verify that the file permissions are correctly set to 644 or more restrictive:

stat -c %a /etc/default/docker

If the permissions are not set to 644, this is a finding.
Fix Text (F-101445r1_fix)
Set the file permissions for this file to 644.

Run the following command:
chmod 644 /etc/default/docker