DKER-EE-002120 - The Docker Enterprise hosts user namespace must not be shared.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Do not share the host's user namespaces with the containers.

User namespaces ensure that a root process inside the container will be mapped to a non-root process outside the container. Sharing the user namespaces of the host with the container thus does not isolate users on the host with users on the containers.

By default, the host user namespace is shared with the containers until user namespace support is enabled.

Solution

This fix only applies to the use of Docker Engine - Enterprise on a Linux host operating system.

Do not share user namespaces between host and containers.

For example, do not run a container as below:

docker run --rm -it --userns=host <image>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7, CAT|I, CCI|CCI-000381, Rule-ID|SV-235817r627578_rule, STIG-ID|DKER-EE-002120, STIG-Legacy|SV-104807, STIG-Legacy|V-95669, Vuln-ID|V-235817

Plugin: Unix

Control ID: 9beabc180832c8050c59b07cac4bdc9db45ff25b697a2ffce401a8ebfa1ffbf7