Control: 3.24 Ensure that the Containerd socket file permissions are set to 660 or more restrictively
Description
You should verify that the Containerd socket file has permissions of 660 or are configured more restrictively.
Only root and the members of the root group should be allowed to read and write to the default Containerd Unix socket. The Containerd socket file should therefore have permissions of 660 or more restrictive permissions.
Remediation
You should execute the following command
chmod 660 /run/containerd/containerd.sock
This sets the file permissions of the Containerd socket file to 660.
Default Value
By default, the permissions for the Containerd socket file is correctly set to 660.
Usage
Run the control in your terminal:
powerpipe control run docker_compliance.control.cis_v160_3_24Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run docker_compliance.control.cis_v160_3_24 --shareSQL
This control uses a named query:
with os_output as (  select    btrim(stdout_output, E' \n\r\t') as os,    _ctx ->> 'connection_name' as os_conn  from    exec_command  where    command = 'uname -s'), hostname as (  select    btrim(stdout_output, E' \n\r\t') as host,    _ctx ->> 'connection_name' as host_conn,    _ctx  from    exec_command  where    command = 'hostname'),
linux_output as (  select    stdout_output,    stderr_output,    _ctx ->> 'connection_name' as conn  from    exec_command,    os_output  where    os_conn = _ctx ->> 'connection_name'    and command = 'stat -c %a /run/containerd/containerd.sock')select  host as resource,  case    when os.os ilike '%Darwin%' then 'skip'    when o.stderr_output like '%No such file or directory%' then 'skip'    when o.stdout_output like '%660%' or o.stdout_output like '%600%' then 'ok'    else 'alarm'  end as status,  case    when os.os ilike '%Darwin%' then host || ' /run/containerd/containerd.sock does not exist on ' || os.os || ' OS.'    when o.stderr_output like '%No such file or directory%' then host || ' recommendation is not applicable as the file is unavailable.'    else host || ' containerd socket file permission set to ' || (btrim(o.stdout_output, E' \n\r\t')) || '.'    end as reason    , h._ctx ->> 'connection_name' as connection_namefrom  hostname as h,  os_output as os,  linux_output as owhere  os.os_conn = h.host_conn  and h.host_conn = o.conn;