You should verify that the
/etc/default/docker file ownership and group-ownership is correctly set to root.
/etc/default/docker file contains sensitive parameters that may alter the behavior of the Docker daemon. It should therefore be individually owned and group owned by root to ensure that it cannot be modified by less privileged users.
Verify that the
/etc/default/docker file is individually owned and group-owned by root by running:
stat -c %U:%G /etc/default/docker | grep -v root:root
The command should return no results.
Execute the following command:
chown root:root /etc/default/docker
This sets the ownership and group ownership of the file to root.
This file may not be present on the system, and in this case, this recommendation is not applicable.
5.1 Minimize And Sparingly Use Administrative Privileges - Minimize administrative privileges and only use administrative accounts when they are required. Implement focused auditing on the use of administrative privileged functions and monitor for anomalous behavior.