1.1.9 Ensure that the Container Network Interface file permissions are set to 600 or more restrictive

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensure that the Container Network Interface files have permissions of 600 or more restrictive.

Rationale:

Container Network Interface provides various networking options for overlay networking. You should consult their documentation and restrict their respective file permissions to maintain the integrity of those files. Those files should be writable by only the administrators on the system.

Impact:

None

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

No remediation required; file permissions are managed by the operator.

Default Value:

In OpenShift 4, the default values are:

/host/etc/cni/net.d/00-multus.conf = 600 /host/var/run/multus/cni/net.d/80-openshift-network.conf = 644 /var/lib/cni/networks/openshift-sdn/* = 644 /var/run/openshift-sdn/cniserver/config.json = 444 /var/run/openvswitch/ovs-vswitchd.pid = 644 /etc/openvswitch/conf.db = 644 /etc/openvswitch/system-id.conf = 644 /etc/openvswitch/.conf.db.~lock~ = 600 /run/openvswitch/ovs-vswitchd.pid = 644 /run/openvswitch/ovsdb-server.pid = 644

See Also

https://workbench.cisecurity.org/files/3980