Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Docker Enterprise exec commands must not be used with the user option.
<VulnDiscussion>Do not docker exec with --user option. Using --user option in docker exec executes the command within the container as that ...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
cgroup usage must be confirmed in Docker Enterprise.
<VulnDiscussion>It is possible to attach to a particular cgroup on container run. Confirming cgroup usage would ensure that containers are ru...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
All Docker Enterprise containers must be restricted from acquiring additional privileges.
<VulnDiscussion>Restrict the container from acquiring additional privileges via suid or sgid bits. A process can set the no_new_priv bit in ...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise hosts user namespace must not be shared.
<VulnDiscussion>Do not share the host's user namespaces with the containers. User namespaces ensure that a root process inside the container...Rule High Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise socket must not be mounted inside any containers.
<VulnDiscussion>The docker socket docker.sock (Linux) and \\.\pipe\docker_engine (Windows) should not be mounted inside a container, with the...Rule High Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules