Control: 1.1.9 Ensure auditing is configured for Docker files and directories - docker.socket
Description
Audit the containerd.sock if applicable. As well as auditing the normal Linux file system and system calls, you should also audit the Docker daemon. Because this daemon runs with root privileges, it is very important
to audit its activities and usage. Its behavior depends on some key files and directories with containerd.sock being one such file, and as this holds various parameters for the Docker daemon, it should be audited.
Remediation
If the file exists, a rule for it should be added.
For example,
Add the line as below to the /etc/audit/audit.rules file:
-w /run/containerd/containerd.sock -k docker
Then, restart the audit daemon using the following command
systemctl restart auditd
Default Value
By default, Docker related files and directories are not audited. The file containerd.sock
may not be present, but if it is, it should be audited.
Usage
Run the control in your terminal:
powerpipe control run docker_compliance.control.cis_v160_1_1_9Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run docker_compliance.control.cis_v160_1_1_9 --shareSQL
This control uses a named query:
with os_output as (  select    btrim(stdout_output, E' \n\r\t') as os,    _ctx ->> 'connection_name' as os_conn  from    exec_command  where    command = 'uname -s'), hostname as (  select    btrim(stdout_output, E' \n\r\t') as host,    _ctx ->> 'connection_name' as host_conn,    _ctx  from    exec_command  where    command = 'hostname'),
linux_output as (  select    stdout_output,    _ctx ->> 'connection_name' as conn  from    exec_command,    os_output  where    os_conn = _ctx ->> 'connection_name'    and command = 'sudo -n auditctl -l | grep docker.socket'),linux_file_location as (  select    stdout_output,    _ctx ->> 'connection_name' as conn  from    exec_command,    os_output  where    os_conn = _ctx ->> 'connection_name'    and command = 'echo $(systemctl show -p FragmentPath docker.socket)')select  host as resource,  case    when os.os ilike '%Darwin%' then 'skip'    when l.stdout_output = '' then 'skip'    when o.stdout_output = '' then 'alarm'    else 'ok'  end as status,  case    when os.os ilike '%Darwin%' then host || ' docker.socket does not exist on ' || os.os || ' OS.'    when l.stdout_output = '' then host || ' recommendation is not applicable as the file is unavailable.'    when o.stdout_output = '' then host || ' docker.socket auditing is not configured.'    else host || ' docker.socket auditing is configured.'  end as reason  , h._ctx ->> 'connection_name' as connection_namefrom  hostname as h,  os_output as os,  linux_output as o,  linux_file_location as lwhere  os.os_conn = h.host_conn  and h.host_conn = o.conn  and h.host_conn = l.conn;