II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000190
Group -
The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls must be set to 10 and 0 respectively in Docker Enterprise.
The Universal Control Plane (UCP) component of Docker Enterprise includes a built-in access authorization mechanism called eNZi which can be integrated with an LDAP server and subsequently terminat...Rule Medium Severity -
SRG-APP-000231
Group -
Docker Secrets must be used to store configuration files and small amounts of user-generated data (up to 500 kb in size) in Docker Enterprise.
By leveraging Docker Secrets or Kubernetes secrets to store configuration files and small amounts of user-generated data (up to 500 kb in size), the data is encrypted at rest by the Engine's FIPS-v...Rule Medium Severity -
SRG-APP-000247
Group -
Docker Enterprise container health must be checked at runtime.
If the container image does not have an HEALTHCHECK instruction defined, use --health-cmd parameter at container runtime for checking container health. One of the important security triads is avai...Rule Medium Severity -
SRG-APP-000247
Group -
PIDs cgroup limits must be used in Docker Enterprise.
Use --pids-limit flag at container runtime. Attackers could launch a fork bomb with a single command inside the container. This fork bomb can crash the entire system and requires a restart of the ...Rule Medium Severity -
SRG-APP-000295
Group -
The Docker Enterprise per user limit login session control must be set per the requirements in the System Security Plan (SSP).
The Universal Control Plane (UCP) component of Docker Enterprise includes a built-in access authorization mechanism called eNZi which can be integrated with an LDAP server and allows for automatic ...Rule Low Severity -
SRG-APP-000342
Group -
Docker Enterprise images must be built with the USER instruction to prevent containers from running as root.
Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. The eNZi backpla...Rule Medium Severity -
SRG-APP-000343
Group -
An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
The UCP and DTR components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the following endpoints: Kubernetes API, Swarm API and UCP API....Rule Medium Severity -
SRG-APP-000357
Group -
The Docker Enterprise max-size and max-file json-file drivers logging options in the daemon.json configuration file must be configured to allocate audit record storage capacity for Universal Control Plane (UCP) and Docker Trusted Registry (DTR) per the requirements set forth by the System Security Plan (SSP).
By default, the UCP and DTR components of Docker Enterprise leverage the "json-file" Engine logging driver. This driver has configurable "max-size" and "max-file" options which are applicable in th...Rule Medium Severity -
SRG-APP-000358
Group -
All Docker Engine - Enterprise nodes must be configured with a log driver plugin that sends logs to a remote log aggregation system (SIEM).
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
SRG-APP-000359
Group -
Log aggregation/SIEM systems must be configured to alarm when audit storage space for Docker Engine - Enterprise nodes exceed 75% usage.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
SRG-APP-000360
Group -
Log aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.
The Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise provide audit record generation capabilities. Audit logs capture all HTTP actions for the followi...Rule Medium Severity -
SRG-APP-000377
Group -
The Docker Enterprise log aggregation/SIEM systems must be configured to send an alert the ISSO/ISSM when unauthorized software is installed.
A Docker image is analogous to software in the context of this control. All components of Docker Enterprise can be configured to send logs to a remote syslog server in order to meet the requiremen...Rule Medium Severity -
SRG-APP-000383
Group -
Docker Enterprise network ports on all running containers must be limited to what is needed.
By itself, Docker Engine - Enterprise is configured by default to listen for API requests via a UNIX domain socket (or IPC socket) created at /var/run/docker.sock on supported Linux distributions a...Rule Medium Severity -
SRG-APP-000386
Group -
Content Trust enforcement must be enabled in Universal Control Plane (UCP) in Docker Enterprise.
The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker ...Rule Medium Severity -
SRG-APP-000386
Group -
Only trusted, signed images must be on Universal Control Plane (UCP) in Docker Enterprise.
The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker ...Rule Medium Severity -
SRG-APP-000414
Group -
Vulnerability scanning must be enabled for all repositories in the Docker Trusted Registry (DTR) component of Docker Enterprise.
DTR can scan Docker images for vulnerabilities and this capability should be enabled to meet the requirements of this control. When enabled, for every Docker image that is pushed to DTR, a scan of...Rule Medium Severity -
SRG-APP-000427
Group -
Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.
Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. The eNZi backplane includes its own manage...Rule Medium Severity -
SRG-APP-000427
Group -
Docker Trusted Registry (DTR) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.
Both the Universal Control Plane (UCP) and DTR components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. The eNZi backplane includes its own manage...Rule Medium Severity -
SRG-APP-000435
Group -
The on-failure container restart policy must be is set to 5 in Docker Enterprise.
Using the --restart flag in docker run command, specify a restart policy for how a container should or should not be restarted on exit. Choose the on-failure restart policy and limit the restart at...Rule Medium Severity -
SRG-APP-000435
Group -
The Docker Enterprise default ulimit must not be overwritten at runtime unless approved in the System Security Plan (SSP).
The default ulimit is set at the Docker daemon level. However, override the default ulimit setting, if needed, during container runtime. ulimit provides control over the resources available to the...Rule Medium Severity -
SRG-APP-000454
Group -
Docker Enterprise older Universal Control Plane (UCP) and Docker Trusted Registry (DTR) images must be removed from all cluster nodes upon upgrading.
When upgrading either the UCP or DTR components of Docker Enterprise, the newer images are pulled (or unpacked if offline) onto Engine nodes in a cluster. Once the upgrade is complete, one must man...Rule Medium Severity -
SRG-APP-000475
Group -
Only trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.
The Universal Control Plane (UCP) and DTR components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker ...Rule Medium Severity -
SRG-APP-000485
Group -
Docker Content Trust enforcement must be enabled in Universal Control Plane (UCP).
The UCP and Docker Trusted Registry (DTR) components of Docker Enterprise can be used in concert with built-in audit logging capabilities to audit detected potential integrity violations per the re...Rule Medium Severity -
SRG-APP-000516
Group -
Docker Swarm must have the minimum number of manager nodes.
Ensure that the minimum number of required manager nodes is created in a swarm. Manager nodes within a swarm have control over the swarm and change its configuration modifying security parameters....Rule Medium Severity -
SRG-APP-000516
Group -
Docker Enterprise Swarm manager auto-lock key must be rotated periodically.
Rotate swarm manager auto-lock key periodically. Swarm manager auto-lock key is not automatically rotated. Rotate them periodically as a best practice. By default, keys are not rotated automatica...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.