DKER-EE-002000 - Docker Enterprise hosts network namespace must not be shared.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The networking mode on a container when set to --net=host, skips placing the container inside separate network stack. In essence, this choice tells Docker to not containerize the container's networking. This would network-wise mean that the container lives 'outside' in the main Docker host and has full access to its network interfaces.

This is potentially dangerous. It allows the container process to open low-numbered ports like any other root process. It also allows the container to access network services like D-bus on the Docker host. Thus, a container process can potentially do unexpected things such as shutting down the Docker host. Do not use this option.

By default, container connects to Docker bridge.

Solution

Do not pass --net=host or --network=host options when starting the container.

For example, when executing docker run, do not use the --net=host nor --network=host arguments.

A more detailed reference for the docker run command can be found at https://docs.docker.com/engine/reference/run/.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|I, CCI|CCI-000381, Rule-ID|SV-235805r627542_rule, STIG-ID|DKER-EE-002000, STIG-Legacy|SV-104783, STIG-Legacy|V-95645, Vuln-ID|V-235805

Plugin: Unix

Control ID: efd9bcf82093ceed84289822d901309566c84faed32054fd6cd50511c56d436f