DKER-EE-001960 - Privileged Linux containers must not be used for Docker Enterprise.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Using the --privileged flag gives all Linux Kernel Capabilities to the container thus overwriting the --cap-add and --cap-drop flags. Ensure that it is not used. The --privileged flag gives all capabilities to the container, and it also lifts all the limitations enforced by the device cgroup controller. In other words, the container can then do almost everything that the host can do. This flag exists to allow special use-cases, like running Docker within Docker.

Solution

This fix only applies to the use of Docker Engine - Enterprise on a Linux host operating system and should be executed on all nodes in a Docker Enterprise cluster.

Do not run containers with the --privileged flag.

For example, do not start a container as below:

docker run --interactive --tty --privileged centos /bin/bash

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(4), CAT|II, CCI|CCI-000381, Rule-ID|SV-235802r672378_rule, STIG-ID|DKER-EE-001960, STIG-Legacy|SV-104777, STIG-Legacy|V-95639, Vuln-ID|V-235802

Plugin: Unix

Control ID: dd99ab9d60674353cc0c24a31e3bfead1c7b8f7c3882c4f666dc92e8db608579