Skip to content

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise hosts process namespace must not be shared.

    &lt;VulnDiscussion&gt;Process ID (PID) namespaces isolate the PID number space, meaning that processes in different PID namespaces can have the sam...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise hosts IPC namespace must not be shared.

    &lt;VulnDiscussion&gt;IPC (POSIX/SysV IPC) namespace provides separation of named shared memory segments, semaphores, and message queues. IPC names...
    Rule Medium Severity
  • SRG-APP-000090

    <GroupDescription></GroupDescription>
    Group
  • log-opts on all Docker Engine - Enterprise nodes must be configured.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Medium Severity
  • SRG-APP-000108

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Low Severity
  • Experimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.

    &lt;VulnDiscussion&gt;Avoid experimental features in production. Docker Enterprise includes the following capabilities that are considered non-ess...
    Rule Medium Severity
  • Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.

    &lt;VulnDiscussion&gt;All packaged components of Docker Enterprise are digitally signed using GPG keys maintained by Docker, Inc. The Docker Engine...
    Rule Low Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.

    &lt;VulnDiscussion&gt;Docker considers a private registry either secure or insecure. By default, registries are considered secure. Docker Enterpri...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.

    &lt;VulnDiscussion&gt;The aufs storage driver is the oldest storage driver. It is based on a Linux kernel patch-set that is unlikely to be merged i...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.

    &lt;VulnDiscussion&gt;The docker daemon starts a userland proxy service for port forwarding whenever a port is exposed. Where hairpin NAT is availa...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.

    &lt;VulnDiscussion&gt;Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules