1. Home
  2. Security Hardening
  3. CIS Docker 1.13.0 V1.0.0 L1 Docker
  4. Verify that registry certificate file ownership is set to root:root

Verify that registry certificate file ownership is set to root:root

Details

Verify that all the registry certificate files (usually found under/etc/docker/certs.d/directory) are owned and group-owned by ‘root’.

Rationale:

/etc/docker/certs.d/directory contains Docker registry certificates. These certificate files must be owned and group-owned by ‘root’ to maintain the integrity of the certificates.

Solution

chown root:root /etc/docker/certs.d//*

This would set the ownership and group-ownership for the registry certificate files to ‘root’.

Impact:

None.

Default Value:

By default, the ownership and group-ownership for registry certificate files is correctly set to ‘root’.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles