Skip to content

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Docker Enterprise secret management commands must be used for managing secrets in a Swarm cluster.

    <VulnDiscussion>Use Docker's in-built secret management commands for managing sensitive data that which can be stored in key/value pairs. Exa...
    Rule Medium Severity
  • SRG-APP-000190

    <GroupDescription></GroupDescription>
    Group
  • The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls must be set to 10 and 0 respectively in Docker Enterprise.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) component of Docker Enterprise includes a built-in access authorization mechanism called eN...
    Rule Medium Severity
  • SRG-APP-000231

    <GroupDescription></GroupDescription>
    Group
  • Docker Secrets must be used to store configuration files and small amounts of user-generated data (up to 500 kb in size) in Docker Enterprise.

    &lt;VulnDiscussion&gt;By leveraging Docker Secrets or Kubernetes secrets to store configuration files and small amounts of user-generated data (up ...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise container health must be checked at runtime.

    &lt;VulnDiscussion&gt;If the container image does not have an HEALTHCHECK instruction defined, use --health-cmd parameter at container runtime for ...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • PIDs cgroup limits must be used in Docker Enterprise.

    &lt;VulnDiscussion&gt;Use --pids-limit flag at container runtime. Attackers could launch a fork bomb with a single command inside the container. T...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise per user limit login session control must be set per the requirements in the System Security Plan (SSP).

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) component of Docker Enterprise includes a built-in access authorization mechanism called eN...
    Rule Low Severity
  • SRG-APP-000342

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise images must be built with the USER instruction to prevent containers from running as root.

    &lt;VulnDiscussion&gt;Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same au...
    Rule Medium Severity
  • SRG-APP-000343

    <GroupDescription></GroupDescription>
    Group
  • An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).

    &lt;VulnDiscussion&gt;The UCP and DTR components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP act...
    Rule Medium Severity
  • SRG-APP-000357

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise max-size and max-file json-file drivers logging options in the daemon.json configuration file must be configured to allocate audit record storage capacity for Universal Control Plane (UCP) and Docker Trusted Registry (DTR) per the requirements set forth by the System Security Plan (SSP).

    &lt;VulnDiscussion&gt;By default, the UCP and DTR components of Docker Enterprise leverage the "json-file" Engine logging driver. This driver has c...
    Rule Medium Severity
  • SRG-APP-000358

    <GroupDescription></GroupDescription>
    Group
  • All Docker Engine - Enterprise nodes must be configured with a log driver plugin that sends logs to a remote log aggregation system (SIEM).

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Medium Severity
  • SRG-APP-000359

    <GroupDescription></GroupDescription>
    Group
  • Log aggregation/SIEM systems must be configured to alarm when audit storage space for Docker Engine - Enterprise nodes exceed 75% usage.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Medium Severity
  • SRG-APP-000360

    <GroupDescription></GroupDescription>
    Group
  • Log aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Medium Severity
  • SRG-APP-000377

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise log aggregation/SIEM systems must be configured to send an alert the ISSO/ISSM when unauthorized software is installed.

    &lt;VulnDiscussion&gt;A Docker image is analogous to software in the context of this control. All components of Docker Enterprise can be configure...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise network ports on all running containers must be limited to what is needed.

    &lt;VulnDiscussion&gt;By itself, Docker Engine - Enterprise is configured by default to listen for API requests via a UNIX domain socket (or IPC so...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • Content Trust enforcement must be enabled in Universal Control Plane (UCP) in Docker Enterprise.

    &lt;VulnDiscussion&gt;The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity chec...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • Only trusted, signed images must be on Universal Control Plane (UCP) in Docker Enterprise.

    &lt;VulnDiscussion&gt;The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity chec...
    Rule Medium Severity
  • SRG-APP-000414

    <GroupDescription></GroupDescription>
    Group
  • Vulnerability scanning must be enabled for all repositories in the Docker Trusted Registry (DTR) component of Docker Enterprise.

    &lt;VulnDiscussion&gt;DTR can scan Docker images for vulnerabilities and this capability should be enabled to meet the requirements of this control...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.

    &lt;VulnDiscussion&gt;Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authoriza...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • Docker Trusted Registry (DTR) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.

    &lt;VulnDiscussion&gt;Both the Universal Control Plane (UCP) and DTR components of Docker Enterprise leverage the same authentication and authoriza...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • The on-failure container restart policy must be is set to 5 in Docker Enterprise.

    &lt;VulnDiscussion&gt;Using the --restart flag in docker run command, specify a restart policy for how a container should or should not be restarte...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).

    &lt;VulnDiscussion&gt;Rotate swarm node certificates as appropriate. Docker Swarm uses mutual TLS for clustering operations amongst its nodes. Cer...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise default ulimit must not be overwritten at runtime unless approved in the System Security Plan (SSP).

    &lt;VulnDiscussion&gt;The default ulimit is set at the Docker daemon level. However, override the default ulimit setting, if needed, during contain...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise older Universal Control Plane (UCP) and Docker Trusted Registry (DTR) images must be removed from all cluster nodes upon upgrading.

    &lt;VulnDiscussion&gt;When upgrading either the UCP or DTR components of Docker Enterprise, the newer images are pulled (or unpacked if offline) on...
    Rule Medium Severity
  • SRG-APP-000475

    <GroupDescription></GroupDescription>
    Group
  • Only trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and DTR components of Docker Enterprise can be used in concert to perform an integrity chec...
    Rule Medium Severity
  • SRG-APP-000485

    <GroupDescription></GroupDescription>
    Group
  • Docker Content Trust enforcement must be enabled in Universal Control Plane (UCP).

    &lt;VulnDiscussion&gt;The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert with built-in audit logging ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules