Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000516
Group -
Docker Enterprise server certificate key file permissions must be set to 400.
Verify that the Docker server certificate key file (the file that is passed along with --TLSkey parameter) has permissions of 400. The Docker server certificate key file should be protected from a...Rule High Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
Docker Enterprise socket file permissions must be set to 660 or more restrictive.
Verify that the Docker socket file has permissions of 660 or more restrictive. Only root and members of docker group should be allowed to read and write to default Docker UNIX socket. Hence, the D...Rule High Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
Docker Enterprise /etc/default/docker file ownership must be set to root:root.
Verify that the /etc/default/docker file ownership and group-ownership is correctly set to root. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daemon...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.
Verify that the /etc/default/docker file permissions are correctly set to 644 or more restrictive. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daem...Rule High Severity -
SRG-APP-000175
Group -
SRG-APP-000416
Group -
Docker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.
Encrypt data exchanged between containers on different nodes on the overlay network. By default, data exchanged between containers on different nodes on the overlay network is not encrypted. This ...Rule Medium Severity -
SRG-APP-000142
Group -
SRG-APP-000560
Group -
Docker Enterprise Universal Control Plane (UCP) must be configured to use TLS 1.2.
By default docker UCP is configured to use TLS v1.2, if this setting is misconfigured, older protocols containing security weaknesses could be utilized. TLS requires a handshake between client and ...Rule Medium Severity -
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
When FIPS mode is enabled on a Docker Engine - Enterprise node, it uses FIPS-validated cryptography to protect the confidentiality of remote access sessions to any bound TCP sockets with TLS enable...Rule High Severity -
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. eNZi provides UCP and DTR with role-based ...Rule Medium Severity -
Docker Enterprise sensitive host system directories must not be mounted on containers.
Sensitive host system directories such as below should not be allowed to be mounted as container volumes especially in read-write mode. Linux: / /boot /dev /etc /lib /proc /sys /usr Windows: %w...Rule Medium Severity -
log-opts on all Docker Engine - Enterprise nodes must be configured.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.
All packaged components of Docker Enterprise are digitally signed using GPG keys maintained by Docker, Inc. The Docker Engine - Enterprise daemon, itself, is digitally signed. Furthermore, all Dock...Rule Low Severity -
The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Docker Trusted Registry (DTR) and s...Rule Medium Severity -
Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Universal Control Plane (UCP) and D...Rule Medium Severity -
SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.
SELinux provides a Mandatory Access Control (MAC) system on RHEL and CentOS that greatly augments the default Discretionary Access Control (DAC) model. The user can thus add an extra layer of safet...Rule Medium Severity -
SSH must not run within Linux containers for Docker Enterprise.
SSH server should not be running within the container. The user should instead use Universal Control Plane (UCP) to console in to running containers. Running SSH within the container increases the...Rule Medium Severity -
Only required ports must be open on the containers in Docker Enterprise.
Dockerfile for a container image defines the ports to be opened by default on a container instance. The list of ports may or may not be relevant to the application running within the container. A ...Rule Medium Severity -
Docker Enterprise CPU priority must be set appropriately on all containers.
By default, all containers on a Docker host share the resources equally. By using the resource management capabilities of Docker host, such as CPU shares, the user control the host CPU resources th...Rule Low Severity -
The Docker Enterprise hosts UTS namespace must not be shared.
UTS namespaces provide isolation of two system identifiers: the hostname and the NIS domain name. It is used for setting the hostname and the domain that is visible to running processes in that nam...Rule Medium Severity -
All Docker Enterprise containers must be restricted from acquiring additional privileges.
Restrict the container from acquiring additional privileges via suid or sgid bits. A process can set the no_new_priv bit in the kernel. It persists across fork, clone, and execve. The no_new_priv ...Rule High Severity -
Docker Enterprise incoming container traffic must be bound to a specific host interface.
By default, Docker containers can make connections to the outside world, but the outside world cannot connect to containers. Each outgoing connection will appear to originate from one of the host m...Rule Medium Severity -
SAML integration must be enabled in Docker Enterprise.
Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. The eNZi backpla...Rule Medium Severity -
Docker Enterprise container health must be checked at runtime.
If the container image does not have an HEALTHCHECK instruction defined, use --health-cmd parameter at container runtime for checking container health. One of the important security triads is avai...Rule Medium Severity -
The Docker Enterprise max-size and max-file json-file drivers logging options in the daemon.json configuration file must be configured to allocate audit record storage capacity for Universal Control Plane (UCP) and Docker Trusted Registry (DTR) per the requirements set forth by the System Security Plan (SSP).
By default, the UCP and DTR components of Docker Enterprise leverage the "json-file" Engine logging driver. This driver has configurable "max-size" and "max-file" options which are applicable in th...Rule Medium Severity -
The Docker Enterprise log aggregation/SIEM systems must be configured to send an alert the ISSO/ISSM when unauthorized software is installed.
A Docker image is analogous to software in the context of this control. All components of Docker Enterprise can be configured to send logs to a remote syslog server in order to meet the requiremen...Rule Medium Severity -
Content Trust enforcement must be enabled in Universal Control Plane (UCP) in Docker Enterprise.
The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker ...Rule Medium Severity -
Vulnerability scanning must be enabled for all repositories in the Docker Trusted Registry (DTR) component of Docker Enterprise.
DTR can scan Docker images for vulnerabilities and this capability should be enabled to meet the requirements of this control. When enabled, for every Docker image that is pushed to DTR, a scan of...Rule Medium Severity -
The on-failure container restart policy must be is set to 5 in Docker Enterprise.
Using the --restart flag in docker run command, specify a restart policy for how a container should or should not be restarted on exit. Choose the on-failure restart policy and limit the restart at...Rule Medium Severity -
The Docker Enterprise default ulimit must not be overwritten at runtime unless approved in the System Security Plan (SSP).
The default ulimit is set at the Docker daemon level. However, override the default ulimit setting, if needed, during container runtime. ulimit provides control over the resources available to the...Rule Medium Severity -
Only trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.
The Universal Control Plane (UCP) and DTR components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker ...Rule Medium Severity -
Docker Enterprise docker.service file ownership must be set to root:root.
Verify that the docker.service file ownership and group-ownership are correctly set to root. docker.service file contains sensitive parameters that may alter the behavior of Docker daemon. Hence, ...Rule High Severity -
Docker Enterprise registry certificate file ownership must be set to root:root.
Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) are owned and group-owned by root. /etc/docker/certs.d/<registry-name> directory ...Rule High Severity -
Docker Enterprise registry certificate file permissions must be set to 444 or more restrictive.
Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) have permissions of 444 or more restrictive. /etc/docker/certs.d/<registry-name> ...Rule Medium Severity -
Docker Enterprise TLS certificate authority (CA) certificate file permissions must be set to 444 or more restrictive.
Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) has permissions of 444 or more restrictive. The TLS CA certificate file should be protected from ...Rule Medium Severity -
Docker Enterprise server certificate file permissions must be set to 444 or more restrictive.
Verify that the Docker server certificate file (the file that is passed along with --TLScert parameter) has permissions of 444 or more restrictive. The Docker server certificate file should be pro...Rule Medium Severity -
Docker Enterprise socket file ownership must be set to root:docker.
Verify that the Docker socket file is owned by root and group-owned by docker. Docker daemon runs as root. The default UNIX socket hence must be owned by root. If any other user or process owns th...Rule High Severity -
Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.
Verify that the daemon.json file permissions are correctly set to 644 or more restrictive. daemon.json file contains sensitive parameters that may alter the behavior of docker daemon. Hence, it sh...Rule High Severity -
Docker Enterprise Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA).
When integrating the UCP and Docker Trusted Registry (DTR) management consoles with an external, trusted certificate authority (CA), both UCP and DTR will validate these certificate chains per the ...Rule Medium Severity -
Docker Enterprise Swarm services must be bound to a specific host interface.
By default, the docker swarm services will listen to all interfaces on the host, which may not be necessary for the operation of the swarm where the host has multiple network interfaces. When a sw...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.