UCF STIG Viewer Logo

Docker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-235859 DKER-EE-005250 SV-235859r627704_rule High
Description
Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) is owned and group-owned by root. The TLS CA certificate file should be protected from any tampering. It is used to authenticate Docker server based on given CA certificate. Hence, it must be owned and group-owned by root to maintain the integrity of the CA certificate. By default, the ownership and group-ownership for TLS CA certificate file is correctly set to root.
STIG Date
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide 2021-03-26

Details

Check Text ( C-39078r627702_chk )
Ensure that TLS CA certificate file ownership is set to root:root.

Execute the below command to verify that the TLS CA certificate file is owned and group-owned by root:

stat -c %U:%G

If the TLS CA certificate permissions are not set to root:root, this is a finding.
Fix Text (F-39041r627703_fix)
Set the ownership and group-ownership for the TLS CA certificate file to root.

Run the following command:
chown root:root