Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Docker Enterprise host devices must not be directly exposed to containers.
<VulnDiscussion>Host devices can be directly exposed to containers at runtime. Do not directly expose host devices to containers especially f...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Mount propagation mode must not set to shared in Docker Enterprise.
<VulnDiscussion>Mount propagation mode allows mounting volumes in shared, slave or private mode on a container. Do not use shared mount propa...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise hosts UTS namespace must not be shared.
<VulnDiscussion>UTS namespaces provide isolation of two system identifiers: the hostname and the NIS domain name. It is used for setting the ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise default seccomp profile must not be disabled.
<VulnDiscussion>Seccomp filtering provides a means for a process to specify a filter for incoming system calls. The default Docker seccomp pr...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Docker Enterprise exec commands must not be used with privileged option.
<VulnDiscussion>Do not use docker exec with --privileged option. Using --privileged option in docker exec gives extended Linux capabilities ...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules