I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001
<GroupDescription></GroupDescription>Group -
The Docker Enterprise Per User Limit Login Session Control in the Universal Control Plane (UCP) Admin Settings must be set to an organization-defined value for all accounts and/or account types.
<VulnDiscussion>The UCP component of Docker Enterprise includes a built-in access authorization mechanism called eNZi which can be integrated...Rule Low Severity -
SRG-APP-000014
<GroupDescription></GroupDescription>Group -
TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
<VulnDiscussion>The UCP component of Docker Enterprise configures and leverages Swarm Mode for node-to-node cluster communication. Swarm Mode...Rule Medium Severity -
SRG-APP-000015
<GroupDescription></GroupDescription>Group -
FIPS mode must be enabled on all Docker Engine - Enterprise nodes.
<VulnDiscussion>When FIPS mode is enabled on a Docker Engine - Enterprise node, it uses FIPS-validated cryptography to protect the confidenti...Rule High Severity -
SRG-APP-000016
<GroupDescription></GroupDescription>Group -
The audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
<VulnDiscussion>The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit...Rule Medium Severity -
SRG-APP-000016
<GroupDescription></GroupDescription>Group -
The host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
<VulnDiscussion>The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...Rule Medium Severity -
SRG-APP-000023
<GroupDescription></GroupDescription>Group -
LDAP integration in Docker Enterprise must be configured.
<VulnDiscussion>Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same au...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
A policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
<VulnDiscussion>Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authoriza...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
A policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
<VulnDiscussion>Both the Universal Control Plane (UCP) and DTR components of Docker Enterprise leverage the same authentication and authoriza...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
Docker Enterprise sensitive host system directories must not be mounted on containers.
<VulnDiscussion>Sensitive host system directories such as below should not be allowed to be mounted as container volumes especially in read-w...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Docker Enterprise hosts process namespace must not be shared.
<VulnDiscussion>Process ID (PID) namespaces isolate the PID number space, meaning that processes in different PID namespaces can have the sam...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Docker Enterprise hosts IPC namespace must not be shared.
<VulnDiscussion>IPC (POSIX/SysV IPC) namespace provides separation of named shared memory segments, semaphores, and message queues. IPC names...Rule Medium Severity -
SRG-APP-000090
<GroupDescription></GroupDescription>Group -
log-opts on all Docker Engine - Enterprise nodes must be configured.
<VulnDiscussion>The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...Rule Medium Severity -
SRG-APP-000108
<GroupDescription></GroupDescription>Group -
Docker Enterprise must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record gene...Rule Low Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.
<VulnDiscussion>All packaged components of Docker Enterprise are digitally signed using GPG keys maintained by Docker, Inc. The Docker Engine...Rule Low Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
<VulnDiscussion>Docker considers a private registry either secure or insecure. By default, registries are considered secure. Docker Enterpri...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.
<VulnDiscussion>The aufs storage driver is the oldest storage driver. It is based on a Linux kernel patch-set that is unlikely to be merged i...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
<VulnDiscussion>The docker daemon starts a userland proxy service for port forwarding whenever a port is exposed. Where hairpin NAT is availa...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Experimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
<VulnDiscussion>Avoid experimental features in production. Docker Enterprise includes the following capabilities that are considered non-ess...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Docker Enterprise self-signed certificates in Docker Trusted Registry (DTR) must be replaced with DoD trusted, signed certificates.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Periodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
An appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.
<VulnDiscussion>AppArmor protects the Ubuntu OS and applications from various threats by enforcing security policy which is also known as App...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.