Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000360

    <GroupDescription></GroupDescription>
    Group
  • Log aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Medium Severity
  • SRG-APP-000377

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise log aggregation/SIEM systems must be configured to send an alert the ISSO/ISSM when unauthorized software is installed.

    &lt;VulnDiscussion&gt;A Docker image is analogous to software in the context of this control. All components of Docker Enterprise can be configure...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise network ports on all running containers must be limited to what is needed.

    &lt;VulnDiscussion&gt;By itself, Docker Engine - Enterprise is configured by default to listen for API requests via a UNIX domain socket (or IPC so...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • Content Trust enforcement must be enabled in Universal Control Plane (UCP) in Docker Enterprise.

    &lt;VulnDiscussion&gt;The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity chec...
    Rule Medium Severity
  • SRG-APP-000386

    <GroupDescription></GroupDescription>
    Group
  • Only trusted, signed images must be on Universal Control Plane (UCP) in Docker Enterprise.

    &lt;VulnDiscussion&gt;The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity chec...
    Rule Medium Severity
  • SRG-APP-000414

    <GroupDescription></GroupDescription>
    Group
  • Vulnerability scanning must be enabled for all repositories in the Docker Trusted Registry (DTR) component of Docker Enterprise.

    &lt;VulnDiscussion&gt;DTR can scan Docker images for vulnerabilities and this capability should be enabled to meet the requirements of this control...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.

    &lt;VulnDiscussion&gt;Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authoriza...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • Docker Trusted Registry (DTR) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.

    &lt;VulnDiscussion&gt;Both the Universal Control Plane (UCP) and DTR components of Docker Enterprise leverage the same authentication and authoriza...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • The on-failure container restart policy must be is set to 5 in Docker Enterprise.

    &lt;VulnDiscussion&gt;Using the --restart flag in docker run command, specify a restart policy for how a container should or should not be restarte...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise default ulimit must not be overwritten at runtime unless approved in the System Security Plan (SSP).

    &lt;VulnDiscussion&gt;The default ulimit is set at the Docker daemon level. However, override the default ulimit setting, if needed, during contain...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules