DKER-EE-002380 - The certificate chain used by Universal Control Plane (UCP) client bundles must match what is defined in the System Security Plan (SSP) in Docker Enterprise.

Information

Both the UCP and Docker Trusted Registry (DTR) components of Docker Enterprise leverage the same authentication and authorization backplane known as eNZi. UCP has the ability to use external certificates or internal self-signed. In the case of self-signed UCP includes a certificate authority which is used to sign client bundles and to authenticate users via the eNZi backplane. With an external certificate authority (CA) users will use their existing x509 certs. The external CA will be added in an administrative function and will dictate the root CA for the user's chain.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

via GUI:

As any user with access to UCP, within the UCP web console, click on the username dropdown in the top-left corner, and select 'My Profile'. On the 'Client Bundles' tab, select the 'New Client Bundle' dropdown and click 'Add Existing Client Bundle'. Provide an appropriate 'Label', and in the 'Public Key' field, paste the public key of the certificate chain provided to that user by the organization. Click 'Confirm' to save the bundle.

via CLI:

Linux (requires curl): As a Docker EE Admin, execute the following commands using a client bundle and from a machine with connectivity to the UCP management console.

curl --cacert ca.pem --cert cert.pem --key key.pem -X POST -H 'Content-Type: application/json' -d '{'certificates':[{'cert':'[encoded_PEM_for_cert]','label':'[cert_label]'}],'label':'[key_description]','publicKey':'[encoded_PEM_for_public_key]'}' https://[ucp_url]/api/accounts/[account_name_or_id]/publickeys

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-Unix_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2)(b), CAT|II, CCI|CCI-000186, Rule-ID|SV-235822r961038_rule, STIG-ID|DKER-EE-002380, STIG-Legacy|SV-104817, STIG-Legacy|V-95679, Vuln-ID|V-235822

Plugin: Unix

Control ID: fb9ad2b9e062a08e557d320d8a145bb0eab4598449acd05f8c3194781dd82705