SV-235787r627488_rule
V-235787
SRG-APP-000108
DKER-EE-001590
CAT III
10
via CLI:
Linux: As a trusted user on the host operating system, open the /etc/docker/daemon.json file for editing. If the file doesn't exist, it must be created.
Set the "log-driver" property to one of the following: "syslog", "awslogs", "splunk", "gcplogs", "logentries" or "<plugin>" (where <plugin> is the naming of a third-party Docker logging driver plugin). Configure the "log-opts" object as required by the selected "log-driver".
Save the file. Restart the docker daemon.
Work with the SIEM administrator to configure an alert when no audit data is received from Docker.
via CLI:
Linux: Execute the following commands as a trusted user on the host operating system:
cat /etc/docker/daemon.json
Verify that the "log-driver" property is set to one of the following: "syslog", "awslogs", "splunk", "gcplogs", "logentries" or "<plugin>" (where <plugin> is the naming of a third-party Docker logging driver plugin).
Work with the SIEM administrator to determine if an alert is configured when audit data is no longer received as expected.
If "log-driver" is not set, or if alarms are not configured in the SIEM, then this is a finding.
V-235787
False
DKER-EE-001590
via CLI:
Linux: Execute the following commands as a trusted user on the host operating system:
cat /etc/docker/daemon.json
Verify that the "log-driver" property is set to one of the following: "syslog", "awslogs", "splunk", "gcplogs", "logentries" or "<plugin>" (where <plugin> is the naming of a third-party Docker logging driver plugin).
Work with the SIEM administrator to determine if an alert is configured when audit data is no longer received as expected.
If "log-driver" is not set, or if alarms are not configured in the SIEM, then this is a finding.
M
5281