7.10 Ensure that management plane traffic is separated from data plane traffic

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

You should separate management plane traffic from data plane traffic.

Rationale:

Separating management plane traffic from data plane traffic ensures that these types of traffic are segregated from each other. These traffic flows can then be individually monitored and tied to different traffic control policies and monitoring. This also ensures that the management plane is always reachable even if there is a great deal of traffic on the data plane.

Solution

You should initialize the swarm with dedicated interfaces for management and data planes respectively.
For example,

docker swarm init --advertise-addr=192.168.0.1 --data-path-addr=17.1.0.3

Impact:

This requires two network interfaces per node.

Default Value:

By default, data plane traffic is not separated from management plane traffic.

See Also

https://workbench.cisecurity.org/files/2433

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(13), CSCv6|18

Plugin: Unix

Control ID: 9368fdfc384ace798ea041d7c9777817eaa4d6ba14e628a313334a64345bbb22