5.30 Ensure that Docker's default bridge 'docker0' is not used

Information

You should not use Docker's default bridge docker0. Instead you should use Docker's user-defined networks for container networking.

Rationale:

Docker connects virtual interfaces created in bridge mode to a common bridge called docker0. This default networking model is vulnerable to ARP spoofing and MAC flooding attacks as there is no filtering applied to it.

Impact:

User-defined networks need to be configured and managed in line with organizational security policy.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

You should follow the Docker documentation and set up a user-defined network. All the containers should be run in this network.

Default Value:

By default, Docker runs containers within the default docker0 bridge.

See Also

https://workbench.cisecurity.org/benchmarks/11818

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7

Plugin: Unix

Control ID: e6c67014fbdf844914833d147443b9153a37559cdaf07b452d3e33390cb5ea33