Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.

    &lt;VulnDiscussion&gt;SELinux provides a Mandatory Access Control (MAC) system on RHEL and CentOS that greatly augments the default Discretionary A...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.

    &lt;VulnDiscussion&gt;By default, Docker starts containers with a restricted set of Linux Kernel Capabilities. It means that any process may be gra...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Privileged Linux containers must not be used for Docker Enterprise.

    &lt;VulnDiscussion&gt;Using the --privileged flag gives all Linux Kernel Capabilities to the container thus overwriting the --cap-add and --cap-dro...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • SSH must not run within Linux containers for Docker Enterprise.

    &lt;VulnDiscussion&gt;SSH server should not be running within the container. The user should instead use Universal Control Plane (UCP) to console i...
    Rule Medium Severity
  • SRG-APP-000141

    <GroupDescription></GroupDescription>
    Group
  • Only required ports must be open on the containers in Docker Enterprise.

    &lt;VulnDiscussion&gt;Dockerfile for a container image defines the ports to be opened by default on a container instance. The list of ports may or ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules