1. Home
  2. Security Hardening
  3. CIS Docker 1.12.0 V1.0.0 L1.Linux
  4. Audit Docker files and directories – /etc/docker

Audit Docker files and directories – /etc/docker

Details

https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html

Solution

Add a rule for /etc/docker directory.For example,Add the line as below in /etc/audit/audit.rules file–w /etc/docker -k dockerThen, restart the audit daemon. For example,service auditd restartImpact-Auditing generates quite big log files. Ensure to rotate and archive them periodically. Also,
create a separate partition of audit to avoid filling root file system.Default Value-
By default, Docker related files and directories are not audited.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles