DKER-EE-002130 - The Docker Enterprise socket must not be mounted inside any containers.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The docker socket docker.sock (Linux) and \.pipedocker_engine (Windows) should not be mounted inside a container, with the exception case being during the installation of Universal Control Plane (UCP) component of Docker Enterprise as it is required for install.

If the docker socket is mounted inside a container it would allow processes running within the container to execute docker commands which effectively allows for full control of the host.

By default, docker.sock (linux) and \.pipedocker_engine (windows) is not mounted inside containers.

Solution

When using the -v/--volume flags to mount volumes to containers in a docker run command, do not use docker.sock as a volume.

A reference for the docker run command can be found at https://docs.docker.com/engine/reference/run/.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-9(2), CAT|I, CCI|CCI-000381, Rule-ID|SV-235818r627581_rule, STIG-ID|DKER-EE-002130, STIG-Legacy|SV-104809, STIG-Legacy|V-95671, Vuln-ID|V-235818

Plugin: Unix

Control ID: b106ee9b80d194db01e24de9e0deaa77ea5e69f96c27b36551b059f91e2c5450