1.1.7 Ensure auditing is configured for Docker files and directories - docker.service | AUDIT AND ACCOUNTABILITY |
1.1.8 Ensure auditing is configured for Docker files and directories - containerd.sock | AUDIT AND ACCOUNTABILITY |
1.1.9 Ensure auditing is configured for Docker files and directories - docker.sock | AUDIT AND ACCOUNTABILITY |
1.1.10 Ensure auditing is configured for Docker files and directories - /etc/default/docker | AUDIT AND ACCOUNTABILITY |
1.1.11 Ensure auditing is configured for Docker files and directories - /etc/docker/daemon.json | AUDIT AND ACCOUNTABILITY |
1.1.12 Ensure auditing is configured for Docker files and directories - /etc/containerd/config.toml | AUDIT AND ACCOUNTABILITY |
1.1.13 Ensure auditing is configured for Docker files and directories - /etc/sysconfig/docker | AUDIT AND ACCOUNTABILITY |
1.1.14 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd | AUDIT AND ACCOUNTABILITY |
1.1.15 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim | AUDIT AND ACCOUNTABILITY |
1.1.16 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v1 | AUDIT AND ACCOUNTABILITY |
1.1.17 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v2 | AUDIT AND ACCOUNTABILITY |
1.1.18 Ensure auditing is configured for Docker files and directories - /usr/bin/runc | AUDIT AND ACCOUNTABILITY |
2.9 Enable user namespace support | SYSTEM AND SERVICES ACQUISITION |
2.10 Ensure the default cgroup usage has been confirmed | SYSTEM AND SERVICES ACQUISITION |
2.11 Ensure base device size is not changed until needed | CONFIGURATION MANAGEMENT |
2.12 Ensure that authorization for Docker client commands is enabled | ACCESS CONTROL |
2.13 Ensure centralized and remote logging is configured | AUDIT AND ACCOUNTABILITY |
2.17 Ensure that a daemon-wide custom seccomp profile is applied if appropriate | SYSTEM AND SERVICES ACQUISITION |
3.17 Ensure that the daemon.json file ownership is set to root:root | ACCESS CONTROL |
3.18 Ensure that daemon.json file permissions are set to 644 or more restrictive | ACCESS CONTROL, MEDIA PROTECTION |
3.19 Ensure that the /etc/default/docker file ownership is set to root:root | ACCESS CONTROL |
3.20 Ensure that the /etc/default/docker file permissions are set to 644 or more restrictively | ACCESS CONTROL, MEDIA PROTECTION |
3.21 Ensure that the /etc/sysconfig/docker file permissions are set to 644 or more restrictively | ACCESS CONTROL, MEDIA PROTECTION |
3.22 Ensure that the /etc/sysconfig/docker file ownership is set to root:root | ACCESS CONTROL |
4.5 Ensure Content trust for Docker is Enabled | SYSTEM AND COMMUNICATIONS PROTECTION |
4.8 Ensure setuid and setgid permissions are removed | ACCESS CONTROL |
4.11 Ensure only verified packages are installed | SYSTEM AND SERVICES ACQUISITION |
5.3 Ensure that, if applicable, SELinux security options are set | SYSTEM AND INFORMATION INTEGRITY |
5.23 Ensure that docker exec commands are not used with the privileged option | ACCESS CONTROL |
5.24 Ensure that docker exec commands are not used with the user=root option | ACCESS CONTROL |
5.30 Ensure that Docker's default bridge "docker0" is not used | CONFIGURATION MANAGEMENT |
CIS_Docker_v1.7.0_L2_Docker_-_Linux.audit from CIS Docker Benchmark v1.7.0 | |