II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000141
Group -
Docker Enterprise hosts network namespace must not be shared.
The networking mode on a container when set to --net=host, skips placing the container inside separate network stack. In essence, this choice tells Docker to not containerize the container's networ...Rule High Severity -
SRG-APP-000141
Group -
Memory usage for all containers must be limited in Docker Enterprise.
By default, all containers on a Docker host share the resources equally. By using the resource management capabilities of Docker host, such as memory limit, the amount of memory that a container ma...Rule Medium Severity -
SRG-APP-000141
Group -
Docker Enterprise CPU priority must be set appropriately on all containers.
By default, all containers on a Docker host share the resources equally. By using the resource management capabilities of Docker host, such as CPU shares, the user control the host CPU resources th...Rule Low Severity -
SRG-APP-000141
Group -
All Docker Enterprise containers root filesystem must be mounted as read only.
The container's root filesystem should be treated as a 'golden image' by using Docker run's --read-only option. This prevents any writes to the container's root filesystem at container runtime and ...Rule High Severity -
SRG-APP-000141
Group -
Docker Enterprise host devices must not be directly exposed to containers.
Host devices can be directly exposed to containers at runtime. Do not directly expose host devices to containers especially for containers that are not trusted. The --device option exposes the hos...Rule High Severity -
SRG-APP-000141
Group -
Mount propagation mode must not set to shared in Docker Enterprise.
Mount propagation mode allows mounting volumes in shared, slave or private mode on a container. Do not use shared mount propagation mode until needed. A shared mount is replicated at all mounts an...Rule Medium Severity -
SRG-APP-000141
Group -
The Docker Enterprise hosts UTS namespace must not be shared.
UTS namespaces provide isolation of two system identifiers: the hostname and the NIS domain name. It is used for setting the hostname and the domain that is visible to running processes in that nam...Rule Medium Severity -
SRG-APP-000141
Group -
The Docker Enterprise default seccomp profile must not be disabled.
Seccomp filtering provides a means for a process to specify a filter for incoming system calls. The default Docker seccomp profile works on whitelist basis and allows 311 system calls blocking all ...Rule High Severity -
SRG-APP-000141
Group -
Docker Enterprise exec commands must not be used with privileged option.
Do not use docker exec with --privileged option. Using --privileged option in docker exec gives extended Linux capabilities to the command. Do not run docker exec with the --privileged option, esp...Rule High Severity -
SRG-APP-000141
Group -
Docker Enterprise exec commands must not be used with the user option.
Do not docker exec with --user option. Using --user option in docker exec executes the command within the container as that user. Do not run docker exec with the --user option , especially when ru...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.