CIS Docker v1.2.0 L2 Docker Linux

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Docker v1.2.0 L2 Docker Linux

Updated: 7/20/2021

Authority: CIS

Plugin: Unix

Revision: 1.5

Estimated Item Count: 23

Audit Items

DescriptionCategories
2.8 Enable user namespace support - /etc/subgid

CONFIGURATION MANAGEMENT

2.8 Enable user namespace support - /etc/subuid

CONFIGURATION MANAGEMENT

2.8 Enable user namespace support - SecurityOptions

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Ensure the default cgroup usage has been confirmed - daemon.json

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Ensure the default cgroup usage has been confirmed - dockerd

SYSTEM AND COMMUNICATIONS PROTECTION

2.10 Ensure base device size is not changed until needed - daemon.json

CONFIGURATION MANAGEMENT

2.10 Ensure base device size is not changed until needed - dockerd

CONFIGURATION MANAGEMENT

2.11 Ensure that authorization for Docker client commands is enabled
2.12 Ensure centralized and remote logging is configured

AUDIT AND ACCOUNTABILITY

2.15 Ensure that a daemon-wide custom seccomp profile is applied if appropriate

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure Content trust for Docker is Enabled

SYSTEM AND INFORMATION INTEGRITY

4.8 Ensure setuid and setgid permissions are removed
4.11 Ensure only verified packages are are installed
5.2 Ensure that, if applicable, SELinux security options are set

SYSTEM AND COMMUNICATIONS PROTECTION

5.22 Ensure that docker exec commands are not used with the privileged option

ACCESS CONTROL

5.23 Ensure that docker exec commands are not used with the user=root option

CONFIGURATION MANAGEMENT

5.29 Ensure that Docker's default bridge 'docker0' is not used
7.5 Ensure that Docker's secret management commands are used for managing secrets in a swarm cluster

CONFIGURATION MANAGEMENT

7.6 Ensure that swarm manager is run in auto-lock mode

ACCESS CONTROL

7.8 Ensure that node certificates are rotated as appropriate

SYSTEM AND COMMUNICATIONS PROTECTION

7.9 Ensure that CA certificates are rotated as appropriate
7.10 Ensure that management plane traffic is separated from data plane traffic

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Docker_v1.2.0_L2_Docker_Linux.audit from CIS Docker Benchmark v1.2.0