CIS Docker v1.7.0 L2 Docker - Linux

Audit Details

Name: CIS Docker v1.7.0 L2 Docker - Linux

Updated: 12/3/2024

Authority: CIS

Plugin: Unix

Revision: 1.0

Estimated Item Count: 32

File Details

Filename: CIS_Docker_v1.7.0_L2_Docker_Linux.audit

Size: 90.6 kB

MD5: bc2c9d6efeeac140bf866d9b7d0938f4
SHA256: b5fa05ac716186d977f60faa0e08f982532435627b5ca887a9ac451c3ba120f8

Audit Items

DescriptionCategories
1.1.7 Ensure auditing is configured for Docker files and directories - docker.service

AUDIT AND ACCOUNTABILITY

1.1.8 Ensure auditing is configured for Docker files and directories - containerd.sock

AUDIT AND ACCOUNTABILITY

1.1.9 Ensure auditing is configured for Docker files and directories - docker.sock

AUDIT AND ACCOUNTABILITY

1.1.10 Ensure auditing is configured for Docker files and directories - /etc/default/docker

AUDIT AND ACCOUNTABILITY

1.1.11 Ensure auditing is configured for Docker files and directories - /etc/docker/daemon.json

AUDIT AND ACCOUNTABILITY

1.1.12 Ensure auditing is configured for Docker files and directories - /etc/containerd/config.toml

AUDIT AND ACCOUNTABILITY

1.1.13 Ensure auditing is configured for Docker files and directories - /etc/sysconfig/docker

AUDIT AND ACCOUNTABILITY

1.1.14 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd

AUDIT AND ACCOUNTABILITY

1.1.15 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim

AUDIT AND ACCOUNTABILITY

1.1.16 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v1

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v2

AUDIT AND ACCOUNTABILITY

1.1.18 Ensure auditing is configured for Docker files and directories - /usr/bin/runc

AUDIT AND ACCOUNTABILITY

2.9 Enable user namespace support

SYSTEM AND SERVICES ACQUISITION

2.10 Ensure the default cgroup usage has been confirmed

SYSTEM AND SERVICES ACQUISITION

2.11 Ensure base device size is not changed until needed

CONFIGURATION MANAGEMENT

2.12 Ensure that authorization for Docker client commands is enabled

ACCESS CONTROL

2.13 Ensure centralized and remote logging is configured

AUDIT AND ACCOUNTABILITY

2.17 Ensure that a daemon-wide custom seccomp profile is applied if appropriate

SYSTEM AND SERVICES ACQUISITION

3.17 Ensure that the daemon.json file ownership is set to root:root

ACCESS CONTROL

3.18 Ensure that daemon.json file permissions are set to 644 or more restrictive

ACCESS CONTROL, MEDIA PROTECTION

3.19 Ensure that the /etc/default/docker file ownership is set to root:root

ACCESS CONTROL

3.20 Ensure that the /etc/default/docker file permissions are set to 644 or more restrictively

ACCESS CONTROL, MEDIA PROTECTION

3.21 Ensure that the /etc/sysconfig/docker file permissions are set to 644 or more restrictively

ACCESS CONTROL, MEDIA PROTECTION

3.22 Ensure that the /etc/sysconfig/docker file ownership is set to root:root

ACCESS CONTROL

4.5 Ensure Content trust for Docker is Enabled

SYSTEM AND COMMUNICATIONS PROTECTION

4.8 Ensure setuid and setgid permissions are removed

ACCESS CONTROL

4.11 Ensure only verified packages are installed

SYSTEM AND SERVICES ACQUISITION

5.3 Ensure that, if applicable, SELinux security options are set

SYSTEM AND INFORMATION INTEGRITY

5.23 Ensure that docker exec commands are not used with the privileged option

ACCESS CONTROL

5.24 Ensure that docker exec commands are not used with the user=root option

ACCESS CONTROL

5.30 Ensure that Docker's default bridge "docker0" is not used

CONFIGURATION MANAGEMENT

CIS_Docker_v1.7.0_L2_Docker_-_Linux.audit from CIS Docker Benchmark v1.7.0