Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • cgroup usage must be confirmed in Docker Enterprise.

    &lt;VulnDiscussion&gt;It is possible to attach to a particular cgroup on container run. Confirming cgroup usage would ensure that containers are ru...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • All Docker Enterprise containers must be restricted from acquiring additional privileges.

    &lt;VulnDiscussion&gt;Restrict the container from acquiring additional privileges via suid or sgid bits. A process can set the no_new_priv bit in ...
    Rule High Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise hosts user namespace must not be shared.

    &lt;VulnDiscussion&gt;Do not share the host's user namespaces with the containers. User namespaces ensure that a root process inside the container...
    Rule High Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • The Docker Enterprise socket must not be mounted inside any containers.

    &lt;VulnDiscussion&gt;The docker socket docker.sock (Linux) and \\.\pipe\docker_engine (Windows) should not be mounted inside a container, with the...
    Rule High Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise privileged ports must not be mapped within containers.

    &lt;VulnDiscussion&gt;The TCP/IP port numbers below 1024 are considered privileged ports. Normal users and processes are not allowed to use them fo...
    Rule High Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise incoming container traffic must be bound to a specific host interface.

    &lt;VulnDiscussion&gt;By default, Docker containers can make connections to the outside world, but the outside world cannot connect to containers. ...
    Rule Medium Severity
  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • SAML integration must be enabled in Docker Enterprise.

    &lt;VulnDiscussion&gt;Both the Universal Control Plane (UCP) and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same au...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The certificate chain used by Universal Control Plane (UCP) client bundles must match what is defined in the System Security Plan (SSP) in Docker Enterprise.

    &lt;VulnDiscussion&gt;Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authoriza...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise Swarm manager must be run in auto-lock mode.

    &lt;VulnDiscussion&gt;Run Docker swarm manager in auto-lock mode. When Docker restarts, both the TLS key used to encrypt communication among swarm...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise secret management commands must be used for managing secrets in a Swarm cluster.

    &lt;VulnDiscussion&gt;Use Docker's in-built secret management commands for managing sensitive data that which can be stored in key/value pairs. Exa...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules