STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

V-235859

CAT I (High)

Docker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.

Rule ID

SV-235859r961863_rule

STIG

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) is owned and group-owned by root. The TLS CA certificate file should be protected from any tampering. It is used to authenticate Docker server based on given CA certificate. Hence, it must be owned and group-owned by root to maintain the integrity of the CA certificate. By default, the ownership and group-ownership for TLS CA certificate file is correctly set to root.

Check Content

Ensure that TLS CA certificate file ownership is set to root:root.

Execute the below command to verify that the TLS CA certificate file is owned and group-owned by root:

stat -c %U:%G <path to TLS CA certificate file> 

If the TLS CA certificate permissions are not set to root:root, this is a finding.

Fix Text

Set the ownership and group-ownership for the TLS CA certificate file to root.

Run the following command:
chown root:root <path to TLS CA certificate file>