III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Periodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Periodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
<VulnDiscussion>Docker Enterprise includes the following capabilities that are considered non-essential: *NOTE: disabling these capabilities...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
An appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.
<VulnDiscussion>AppArmor protects the Ubuntu OS and applications from various threats by enforcing security policy which is also known as App...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.
<VulnDiscussion>SELinux provides a Mandatory Access Control (MAC) system on RHEL and CentOS that greatly augments the default Discretionary A...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.
<VulnDiscussion>By default, Docker starts containers with a restricted set of Linux Kernel Capabilities. It means that any process may be gra...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Privileged Linux containers must not be used for Docker Enterprise.
<VulnDiscussion>Using the --privileged flag gives all Linux Kernel Capabilities to the container thus overwriting the --cap-add and --cap-dro...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
SSH must not run within Linux containers for Docker Enterprise.
<VulnDiscussion>SSH server should not be running within the container. The user should instead use Universal Control Plane (UCP) to console i...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
Only required ports must be open on the containers in Docker Enterprise.
<VulnDiscussion>Dockerfile for a container image defines the ports to be opened by default on a container instance. The list of ports may or ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.