Skip to content

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Only trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.

    The Universal Control Plane (UCP) and DTR components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker ...
    Rule Medium Severity
  • Docker Enterprise docker.service file ownership must be set to root:root.

    Verify that the docker.service file ownership and group-ownership are correctly set to root. docker.service file contains sensitive parameters that may alter the behavior of Docker daemon. Hence, ...
    Rule High Severity
  • Docker Enterprise registry certificate file ownership must be set to root:root.

    Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) are owned and group-owned by root. /etc/docker/certs.d/<registry-name> directory ...
    Rule High Severity
  • Docker Enterprise registry certificate file permissions must be set to 444 or more restrictive.

    Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) have permissions of 444 or more restrictive. /etc/docker/certs.d/<registry-name> ...
    Rule Medium Severity
  • Docker Enterprise TLS certificate authority (CA) certificate file permissions must be set to 444 or more restrictive.

    Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) has permissions of 444 or more restrictive. The TLS CA certificate file should be protected from ...
    Rule Medium Severity
  • Docker Enterprise server certificate file permissions must be set to 444 or more restrictive.

    Verify that the Docker server certificate file (the file that is passed along with --TLScert parameter) has permissions of 444 or more restrictive. The Docker server certificate file should be pro...
    Rule Medium Severity
  • Docker Enterprise socket file ownership must be set to root:docker.

    Verify that the Docker socket file is owned by root and group-owned by docker. Docker daemon runs as root. The default UNIX socket hence must be owned by root. If any other user or process owns th...
    Rule High Severity
  • Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.

    Verify that the daemon.json file permissions are correctly set to 644 or more restrictive. daemon.json file contains sensitive parameters that may alter the behavior of docker daemon. Hence, it sh...
    Rule High Severity
  • Docker Enterprise Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA).

    When integrating the UCP and Docker Trusted Registry (DTR) management consoles with an external, trusted certificate authority (CA), both UCP and DTR will validate these certificate chains per the ...
    Rule Medium Severity
  • Docker Enterprise Swarm services must be bound to a specific host interface.

    By default, the docker swarm services will listen to all interfaces on the host, which may not be necessary for the operation of the swarm where the host has multiple network interfaces. When a sw...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules