II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516
Group -
Docker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).
Rotate swarm node certificates as appropriate. Docker Swarm uses mutual TLS for clustering operations amongst its nodes. Certificate rotation ensures that in an event such as compromised node or k...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise docker.service file ownership must be set to root:root.
Verify that the docker.service file ownership and group-ownership are correctly set to root. docker.service file contains sensitive parameters that may alter the behavior of Docker daemon. Hence, ...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise docker.service file permissions must be set to 644 or more restrictive.
Verify that the docker.service file permissions are correctly set to 644 or more restrictive. docker.service file contains sensitive parameters that may alter the behavior of Docker daemon. Hence,...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise docker.socket file ownership must be set to root:root.
Verify that the docker.socket file ownership and group ownership is correctly set to root. docker.socket file contains sensitive parameters that may alter the behavior of Docker remote API. Hence,...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise docker.socket file permissions must be set to 644 or more restrictive.
Verify that the docker.socket file permissions are correctly set to 644 or more restrictive. docker.socket file contains sensitive parameters that may alter the behavior of Docker remote API. Henc...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise /etc/docker directory ownership must be set to root:root.
Verify that the /etc/docker directory ownership and group-ownership is correctly set to root. /etc/docker directory contains certificates and keys in addition to various sensitive files. Hence, it...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise /etc/docker directory permissions must be set to 755 or more restrictive.
Verify that the /etc/docker directory permissions are correctly set to 755 or more restrictive. /etc/docker directory contains certificates and keys in addition to various sensitive files. Hence, ...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise registry certificate file ownership must be set to root:root.
Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) are owned and group-owned by root. /etc/docker/certs.d/<registry-name> directory ...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise registry certificate file permissions must be set to 444 or more restrictive.
Verify that all the registry certificate files (usually found under /etc/docker/certs.d/<registry-name> directory) have permissions of 444 or more restrictive. /etc/docker/certs.d/<registry-name> ...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.
Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) is owned and group-owned by root. The TLS CA certificate file should be protected from any tamper...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise TLS certificate authority (CA) certificate file permissions must be set to 444 or more restrictive.
Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) has permissions of 444 or more restrictive. The TLS CA certificate file should be protected from ...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise server certificate file ownership must be set to root:root.
Verify that the Docker server certificate file (the file that is passed along with --TLScert parameter) is owned and group-owned by root. The Docker server certificate file should be protected fro...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise server certificate file permissions must be set to 444 or more restrictive.
Verify that the Docker server certificate file (the file that is passed along with --TLScert parameter) has permissions of 444 or more restrictive. The Docker server certificate file should be pro...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise server certificate key file ownership must be set to root:root.
Verify that the Docker server certificate key file (the file that is passed along with --TLSkey parameter) is owned and group-owned by root. The Docker server certificate key file should be protec...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise server certificate key file permissions must be set to 400.
Verify that the Docker server certificate key file (the file that is passed along with --TLSkey parameter) has permissions of 400. The Docker server certificate key file should be protected from a...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise socket file ownership must be set to root:docker.
Verify that the Docker socket file is owned by root and group-owned by docker. Docker daemon runs as root. The default UNIX socket hence must be owned by root. If any other user or process owns th...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise socket file permissions must be set to 660 or more restrictive.
Verify that the Docker socket file has permissions of 660 or more restrictive. Only root and members of docker group should be allowed to read and write to default Docker UNIX socket. Hence, the D...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise daemon.json file ownership must be set to root:root.
Verify that the daemon.json file ownership and group-ownership is correctly set to root. daemon.json file contains sensitive parameters that may alter the behavior of docker daemon. Hence, it shou...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise daemon.json file permissions must be set to 644 or more restrictive.
Verify that the daemon.json file permissions are correctly set to 644 or more restrictive. daemon.json file contains sensitive parameters that may alter the behavior of docker daemon. Hence, it sh...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise /etc/default/docker file ownership must be set to root:root.
Verify that the /etc/default/docker file ownership and group-ownership is correctly set to root. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daemon...Rule High Severity -
SRG-APP-000516
Group -
Docker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.
Verify that the /etc/default/docker file permissions are correctly set to 644 or more restrictive. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daem...Rule High Severity -
SRG-APP-000175
Group -
Docker Enterprise Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA).
When integrating the UCP and Docker Trusted Registry (DTR) management consoles with an external, trusted certificate authority (CA), both UCP and DTR will validate these certificate chains per the ...Rule Medium Severity -
SRG-APP-000416
Group -
Docker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.
Encrypt data exchanged between containers on different nodes on the overlay network. By default, data exchanged between containers on different nodes on the overlay network is not encrypted. This ...Rule Medium Severity -
SRG-APP-000142
Group -
Docker Enterprise Swarm services must be bound to a specific host interface.
By default, the docker swarm services will listen to all interfaces on the host, which may not be necessary for the operation of the swarm where the host has multiple network interfaces. When a sw...Rule Medium Severity -
SRG-APP-000560
Group -
Docker Enterprise Universal Control Plane (UCP) must be configured to use TLS 1.2.
By default docker UCP is configured to use TLS v1.2, if this setting is misconfigured, older protocols containing security weaknesses could be utilized. TLS requires a handshake between client and ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.