Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141

    Group
  • The option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.

    Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of UCP and DTR and should be disregard...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • The Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.

    Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Universal Control Plane (UCP) and D...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Periodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.

    Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of UCP and Docker Trusted Registry (DT...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.

    Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities negatively affects the operation of Universal Control Plane (UCP) and D...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • An appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.

    AppArmor protects the Ubuntu OS and applications from various threats by enforcing security policy which is also known as AppArmor profile. The user can create their own AppArmor profile for contai...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.

    SELinux provides a Mandatory Access Control (MAC) system on RHEL and CentOS that greatly augments the default Discretionary Access Control (DAC) model. The user can thus add an extra layer of safet...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.

    By default, Docker starts containers with a restricted set of Linux Kernel Capabilities. It means that any process may be granted the required capabilities instead of root access. Using Linux Kerne...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Privileged Linux containers must not be used for Docker Enterprise.

    Using the --privileged flag gives all Linux Kernel Capabilities to the container thus overwriting the --cap-add and --cap-drop flags. Ensure that it is not used. The --privileged flag gives all cap...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • SSH must not run within Linux containers for Docker Enterprise.

    SSH server should not be running within the container. The user should instead use Universal Control Plane (UCP) to console in to running containers. Running SSH within the container increases the...
    Rule Medium Severity
  • SRG-APP-000141

    Group
  • Only required ports must be open on the containers in Docker Enterprise.

    Dockerfile for a container image defines the ports to be opened by default on a container instance. The list of ports may or may not be relevant to the application running within the container. A ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules