III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516
Group -
Docker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.
Verify that the /etc/default/docker file permissions are correctly set to 644 or more restrictive. /etc/default/docker file contains sensitive parameters that may alter the behavior of docker daem...Rule High Severity -
SRG-APP-000175
Group -
Docker Enterprise Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA).
When integrating the UCP and Docker Trusted Registry (DTR) management consoles with an external, trusted certificate authority (CA), both UCP and DTR will validate these certificate chains per the ...Rule Medium Severity -
SRG-APP-000416
Group -
Docker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.
Encrypt data exchanged between containers on different nodes on the overlay network. By default, data exchanged between containers on different nodes on the overlay network is not encrypted. This ...Rule Medium Severity -
SRG-APP-000142
Group -
Docker Enterprise Swarm services must be bound to a specific host interface.
By default, the docker swarm services will listen to all interfaces on the host, which may not be necessary for the operation of the swarm where the host has multiple network interfaces. When a sw...Rule Medium Severity -
SRG-APP-000560
Group -
Docker Enterprise Universal Control Plane (UCP) must be configured to use TLS 1.2.
By default docker UCP is configured to use TLS v1.2, if this setting is misconfigured, older protocols containing security weaknesses could be utilized. TLS requires a handshake between client and ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.