Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise hosts IPC namespace must not be shared.

    &lt;VulnDiscussion&gt;IPC (POSIX/SysV IPC) namespace provides separation of named shared memory segments, semaphores, and message queues. IPC names...
    Rule Medium Severity
  • SRG-APP-000090

    <GroupDescription></GroupDescription>
    Group
  • log-opts on all Docker Engine - Enterprise nodes must be configured.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Medium Severity
  • SRG-APP-000108

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...
    Rule Low Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.

    &lt;VulnDiscussion&gt;All packaged components of Docker Enterprise are digitally signed using GPG keys maintained by Docker, Inc. The Docker Engine...
    Rule Low Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.

    &lt;VulnDiscussion&gt;Docker considers a private registry either secure or insecure. By default, registries are considered secure. Docker Enterpri...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.

    &lt;VulnDiscussion&gt;The aufs storage driver is the oldest storage driver. It is based on a Linux kernel patch-set that is unlikely to be merged i...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.

    &lt;VulnDiscussion&gt;The docker daemon starts a userland proxy service for port forwarding whenever a port is exposed. Where hairpin NAT is availa...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Experimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.

    &lt;VulnDiscussion&gt;Avoid experimental features in production. Docker Enterprise includes the following capabilities that are considered non-ess...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.

    &lt;VulnDiscussion&gt;Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise self-signed certificates in Docker Trusted Registry (DTR) must be replaced with DoD trusted, signed certificates.

    &lt;VulnDiscussion&gt;Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules