Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.
<VulnDiscussion>SELinux provides a Mandatory Access Control (MAC) system on RHEL and CentOS that greatly augments the default Discretionary A...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.
<VulnDiscussion>By default, Docker starts containers with a restricted set of Linux Kernel Capabilities. It means that any process may be gra...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Privileged Linux containers must not be used for Docker Enterprise.
<VulnDiscussion>Using the --privileged flag gives all Linux Kernel Capabilities to the container thus overwriting the --cap-add and --cap-dro...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
SSH must not run within Linux containers for Docker Enterprise.
<VulnDiscussion>SSH server should not be running within the container. The user should instead use Universal Control Plane (UCP) to console i...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Only required ports must be open on the containers in Docker Enterprise.
<VulnDiscussion>Dockerfile for a container image defines the ports to be opened by default on a container instance. The list of ports may or ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Docker Enterprise hosts network namespace must not be shared.
<VulnDiscussion>The networking mode on a container when set to --net=host, skips placing the container inside separate network stack. In esse...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Memory usage for all containers must be limited in Docker Enterprise.
<VulnDiscussion>By default, all containers on a Docker host share the resources equally. By using the resource management capabilities of Doc...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Docker Enterprise CPU priority must be set appropriately on all containers.
<VulnDiscussion>By default, all containers on a Docker host share the resources equally. By using the resource management capabilities of Doc...Rule Low Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
All Docker Enterprise containers root filesystem must be mounted as read only.
<VulnDiscussion>The container's root filesystem should be treated as a 'golden image' by using Docker run's --read-only option. This prevents...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Docker Enterprise host devices must not be directly exposed to containers.
<VulnDiscussion>Host devices can be directly exposed to containers at runtime. Do not directly expose host devices to containers especially f...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Mount propagation mode must not set to shared in Docker Enterprise.
<VulnDiscussion>Mount propagation mode allows mounting volumes in shared, slave or private mode on a container. Do not use shared mount propa...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise hosts UTS namespace must not be shared.
<VulnDiscussion>UTS namespaces provide isolation of two system identifiers: the hostname and the NIS domain name. It is used for setting the ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise default seccomp profile must not be disabled.
<VulnDiscussion>Seccomp filtering provides a means for a process to specify a filter for incoming system calls. The default Docker seccomp pr...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Docker Enterprise exec commands must not be used with privileged option.
<VulnDiscussion>Do not use docker exec with --privileged option. Using --privileged option in docker exec gives extended Linux capabilities ...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Docker Enterprise exec commands must not be used with the user option.
<VulnDiscussion>Do not docker exec with --user option. Using --user option in docker exec executes the command within the container as that ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
cgroup usage must be confirmed in Docker Enterprise.
<VulnDiscussion>It is possible to attach to a particular cgroup on container run. Confirming cgroup usage would ensure that containers are ru...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
All Docker Enterprise containers must be restricted from acquiring additional privileges.
<VulnDiscussion>Restrict the container from acquiring additional privileges via suid or sgid bits. A process can set the no_new_priv bit in ...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise hosts user namespace must not be shared.
<VulnDiscussion>Do not share the host's user namespaces with the containers. User namespaces ensure that a root process inside the container...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise socket must not be mounted inside any containers.
<VulnDiscussion>The docker socket docker.sock (Linux) and \\.\pipe\docker_engine (Windows) should not be mounted inside a container, with the...Rule High Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
Docker Enterprise privileged ports must not be mapped within containers.
<VulnDiscussion>The TCP/IP port numbers below 1024 are considered privileged ports. Normal users and processes are not allowed to use them fo...Rule High Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
Docker Enterprise incoming container traffic must be bound to a specific host interface.
<VulnDiscussion>By default, Docker containers can make connections to the outside world, but the outside world cannot connect to containers. ...Rule Medium Severity -
SRG-APP-000149
<GroupDescription></GroupDescription>Group -
SAML integration must be enabled in Docker Enterprise.
<VulnDiscussion>Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same au...Rule Medium Severity -
SRG-APP-000175
<GroupDescription></GroupDescription>Group -
The certificate chain used by Universal Control Plane (UCP) client bundles must match what is defined in the System Security Plan (SSP) in Docker Enterprise.
<VulnDiscussion>Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authoriza...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
Docker Enterprise Swarm manager must be run in auto-lock mode.
<VulnDiscussion>Run Docker swarm manager in auto-lock mode. When Docker restarts, both the TLS key used to encrypt communication among swarm...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.