turbot/steampipe-mod-docker-compliance

Control: 3.24 Ensure that the Containerd socket file permissions are set to 660 or more restrictively

Description

You should verify that the Containerd socket file has permissions of 660 or are configured more restrictively.

Only root and the members of the root group should be allowed to read and write to the default Containerd Unix socket. The Containerd socket file should therefore have permissions of 660 or more restrictive permissions.

Remediation

You should execute the following command

chmod 660 /run/containerd/containerd.sock

This sets the file permissions of the Containerd socket file to 660.

Default Value

By default, the permissions for the Containerd socket file is correctly set to 660.

Usage

Run the control in your terminal:

powerpipe control run docker_compliance.control.cis_v160_3_24

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run docker_compliance.control.cis_v160_3_24 --share

SQL

This control uses a named query:

with os_output as (
select
btrim(stdout_output, E' \n\r\t') as os,
_ctx ->> 'connection_name' as os_conn
from
exec_command
where
command = 'uname -s'
), hostname as (
select
btrim(stdout_output, E' \n\r\t') as host,
_ctx ->> 'connection_name' as host_conn,
_ctx
from
exec_command
where
command = 'hostname'
),
linux_output as (
select
stdout_output,
stderr_output,
_ctx ->> 'connection_name' as conn
from
exec_command,
os_output
where
os_conn = _ctx ->> 'connection_name'
and command = 'stat -c %a /run/containerd/containerd.sock'
)
select
host as resource,
case
when os.os ilike '%Darwin%' then 'skip'
when o.stderr_output like '%No such file or directory%' then 'skip'
when o.stdout_output like '%660%' or o.stdout_output like '%600%' then 'ok'
else 'alarm'
end as status,
case
when os.os ilike '%Darwin%' then host || ' /run/containerd/containerd.sock does not exist on ' || os.os || ' OS.'
when o.stderr_output like '%No such file or directory%' then host || ' recommendation is not applicable as the file is unavailable.'
else host || ' containerd socket file permission set to ' || (btrim(o.stdout_output, E' \n\r\t')) || '.'
end as reason
, h._ctx ->> 'connection_name' as connection_name
from
hostname as h,
os_output as os,
linux_output as o
where
os.os_conn = h.host_conn
and h.host_conn = o.conn;

Tags