Skip to content

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Docker Enterprise server certificate key file permissions must be set to 400.

    <VulnDiscussion>Verify that the Docker server certificate key file (the file that is passed along with --TLSkey parameter) has permissions of...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise socket file ownership must be set to root:docker.

    &lt;VulnDiscussion&gt;Verify that the Docker socket file is owned by root and group-owned by docker. Docker daemon runs as root. The default UNIX ...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise socket file permissions must be set to 660 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that the Docker socket file has permissions of 660 or more restrictive. Only root and members of docker group should ...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that the daemon.json file permissions are correctly set to 644 or more restrictive. daemon.json file contains sensiti...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise /etc/default/docker file ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that the /etc/default/docker file ownership and group-ownership is correctly set to root. /etc/default/docker file co...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that the /etc/default/docker file permissions are correctly set to 644 or more restrictive. /etc/default/docker file ...
    Rule High Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA).

    &lt;VulnDiscussion&gt;When integrating the UCP and Docker Trusted Registry (DTR) management consoles with an external, trusted certificate authorit...
    Rule Medium Severity
  • SRG-APP-000416

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.

    &lt;VulnDiscussion&gt;Encrypt data exchanged between containers on different nodes on the overlay network. By default, data exchanged between cont...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise Swarm services must be bound to a specific host interface.

    &lt;VulnDiscussion&gt;By default, the docker swarm services will listen to all interfaces on the host, which may not be necessary for the operation...
    Rule Medium Severity
  • SRG-APP-000560

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise Universal Control Plane (UCP) must be configured to use TLS 1.2.

    &lt;VulnDiscussion&gt;By default docker UCP is configured to use TLS v1.2, if this setting is misconfigured, older protocols containing security we...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules