Skip to content

Commit c1ac34e

Browse files
committed
update cis control from 11 to 14
Signed-off-by: Patrick Münch <patrick.muench1111@gmail.com>
1 parent 5ce5266 commit c1ac34e

1 file changed

Lines changed: 11 additions & 7 deletions

File tree

controls/docker_host_os_level1.rb

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,8 @@
192192
impact 1.0
193193
title 'Audit Docker files and directories - docker.socket'
194194
desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. docker.socket is one such file. It holds various parameters for Docker daemon socket. It must be audited, if applicable.'
195-
ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
195+
tag 'host'
196+
ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
196197

197198
if docker.socket
198199
rule = '-w ' + docker.socket + ' -p rwxa -k docker'
@@ -210,8 +211,8 @@
210211
impact 1.0
211212
title 'Audit Docker files and directories - /etc/default/docker'
212213
desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /etc/default/docker is one such file. It holds various parameters for Docker daemon. It must be audited, if applicable.'
213-
ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
214-
ref 'https://docs.docker.com/engine/reference/commandline/daemon/#daemon-configuration-file'
214+
tag 'host'
215+
ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
215216

216217
only_if { os[:family] != 'centos' }
217218
describe auditd_rules do
@@ -223,7 +224,9 @@
223224
impact 1.0
224225
title 'Audit Docker files and directories - /etc/docker/daemon.json'
225226
desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /etc/docker/daemon.json is one such file. It holds various parameters for Docker daemon. It must be audited, if applicable.'
226-
ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
227+
tag 'host'
228+
ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
229+
ref 'Daemon configuration', url: 'https://docs.docker.com/engine/reference/commandline/daemon/#daemon-configuration-file'
227230

228231
describe auditd_rules do
229232
its(:lines) { should include('-w /etc/docker/daemon.json -p rwxa -k docker') }
@@ -234,9 +237,10 @@
234237
impact 1.0
235238
title 'Audit Docker files and directories - /usr/bin/docker-containerd'
236239
desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /usr/bin/docker-containerd is one such file. Docker now relies on containerd and runC to spawn containers. It must be audited, if applicable.'
237-
ref 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
238-
ref 'https://github.com/docker/docker/pull/20662'
239-
ref 'https://containerd.tools/'
240+
tag 'host'
241+
ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
242+
ref 'Containerd integration', url: 'https://github.com/docker/docker/pull/20662'
243+
ref 'Containerd tools', url: 'https://containerd.tools/'
240244

241245
describe auditd_rules do
242246
its(:lines) { should include('-w /usr/bin/docker-containerd -p rwxa -k docker') }

0 commit comments

Comments
 (0)