STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

V-235869

CAT I (High)

Docker Enterprise /etc/default/docker file ownership must be set to root:root.

Rule ID

SV-235869r961863_rule

STIG

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Verify that the /etc/default/docker file ownership and group-ownership is correctly set to root. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daemon. Hence, it should be owned and group-owned by root to maintain the integrity of the file. This file may not be present on the system. In that case, this recommendation is not applicable.

Check Content

This requirement applies to Ubuntu Linux systems only. 

Ensure that /etc/default/docker file ownership is set to root:root.

Execute the below command to verify that the file is owned and group-owned by root:

stat -c %U:%G /etc/default/docker 

If file ownership it not set to root:root, this is a finding.

Fix Text

Set the ownership and group-ownership for the file to root.

Run the following command:
chown root:root /etc/default/docker