|
192 | 192 | impact 1.0 |
193 | 193 | title 'Audit Docker files and directories - docker.socket' |
194 | 194 | desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. docker.socket is one such file. It holds various parameters for Docker daemon socket. It must be audited, if applicable.' |
195 | | - ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
| 195 | + tag 'host' |
| 196 | + ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
196 | 197 |
|
197 | 198 | if docker.socket |
198 | 199 | rule = '-w ' + docker.socket + ' -p rwxa -k docker' |
|
210 | 211 | impact 1.0 |
211 | 212 | title 'Audit Docker files and directories - /etc/default/docker' |
212 | 213 | desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /etc/default/docker is one such file. It holds various parameters for Docker daemon. It must be audited, if applicable.' |
213 | | - ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
214 | | - ref 'https://docs.docker.com/engine/reference/commandline/daemon/#daemon-configuration-file' |
| 214 | + tag 'host' |
| 215 | + ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
215 | 216 |
|
216 | 217 | only_if { os[:family] != 'centos' } |
217 | 218 | describe auditd_rules do |
|
223 | 224 | impact 1.0 |
224 | 225 | title 'Audit Docker files and directories - /etc/docker/daemon.json' |
225 | 226 | desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /etc/docker/daemon.json is one such file. It holds various parameters for Docker daemon. It must be audited, if applicable.' |
226 | | - ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
| 227 | + tag 'host' |
| 228 | + ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
| 229 | + ref 'Daemon configuration', url: 'https://docs.docker.com/engine/reference/commandline/daemon/#daemon-configuration-file' |
227 | 230 |
|
228 | 231 | describe auditd_rules do |
229 | 232 | its(:lines) { should include('-w /etc/docker/daemon.json -p rwxa -k docker') } |
|
234 | 237 | impact 1.0 |
235 | 238 | title 'Audit Docker files and directories - /usr/bin/docker-containerd' |
236 | 239 | desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /usr/bin/docker-containerd is one such file. Docker now relies on containerd and runC to spawn containers. It must be audited, if applicable.' |
237 | | - ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
238 | | - ref 'https://github.com/docker/docker/pull/20662' |
239 | | - ref 'https://containerd.tools/' |
| 240 | + tag 'host' |
| 241 | + ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html' |
| 242 | + ref 'Containerd integration', url: 'https://github.com/docker/docker/pull/20662' |
| 243 | + ref 'Containerd tools', url: 'https://containerd.tools/' |
240 | 244 |
|
241 | 245 | describe auditd_rules do |
242 | 246 | its(:lines) { should include('-w /usr/bin/docker-containerd -p rwxa -k docker') } |
|
0 commit comments