II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000141
Group -
cgroup usage must be confirmed in Docker Enterprise.
It is possible to attach to a particular cgroup on container run. Confirming cgroup usage would ensure that containers are running under defined cgroups. System administrators typically define cgr...Rule Medium Severity -
SRG-APP-000141
Group -
All Docker Enterprise containers must be restricted from acquiring additional privileges.
Restrict the container from acquiring additional privileges via suid or sgid bits. A process can set the no_new_priv bit in the kernel. It persists across fork, clone, and execve. The no_new_priv ...Rule High Severity -
SRG-APP-000141
Group -
The Docker Enterprise hosts user namespace must not be shared.
Do not share the host's user namespaces with the containers. User namespaces ensure that a root process inside the container will be mapped to a non-root process outside the container. Sharing the...Rule High Severity -
SRG-APP-000141
Group -
The Docker Enterprise socket must not be mounted inside any containers.
The docker socket docker.sock (Linux) and \\.\pipe\docker_engine (Windows) should not be mounted inside a container, with the exception case being during the installation of Universal Control Plane...Rule High Severity -
SRG-APP-000142
Group -
Docker Enterprise privileged ports must not be mapped within containers.
The TCP/IP port numbers below 1024 are considered privileged ports. Normal users and processes are not allowed to use them for various security reasons. Docker allows a container port to be mapped ...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules