1.1.4 Ensure auditing is configured for Docker files and directories - /run/containerd | CIS Docker v1.6.0 L1 Docker Linux | Unix | AUDIT AND ACCOUNTABILITY |
1.1.9 Ensure auditing is configured for Docker files and directories - docker.sock | CIS Docker v1.6.0 L2 Docker Linux | Unix | AUDIT AND ACCOUNTABILITY |
1.1.12 Ensure auditing is configured for Docker files and directories - /etc/containerd/config.toml | CIS Docker v1.6.0 L2 Docker Linux | Unix | AUDIT AND ACCOUNTABILITY |
2.5 Do not use the aufs storage driver | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
2.11 Ensure base device size is not changed until needed - daemon.json | CIS Docker v1.6.0 L2 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
2.16 Ensure Userland Proxy is Disabled - daemon.json | CIS Docker v1.6.0 L1 Docker Linux | Unix | |
2.17 Ensure that a daemon-wide custom seccomp profile is applied if appropriate | CIS Docker v1.6.0 L2 Docker Linux | Unix | SYSTEM AND SERVICES ACQUISITION |
2.24 Rotate swarm manager auto-lock key periodically | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | |
3.1 Ensure that the docker.service file ownership is set to root:root | CIS Docker v1.6.0 L2 Docker Linux | Unix | ACCESS CONTROL |
3.3 Ensure that docker.socket file ownership is set to root:root | CIS Docker v1.6.0 L1 Docker Linux | Unix | ACCESS CONTROL |
3.9 Verify that TLS CA certificate file ownership is set to root:root | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
3.10 Ensure that TLS CA certificate file permissions are set to 444 or more restrictively | CIS Docker v1.6.0 L2 Docker Linux | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.17 Ensure that the daemon.json file ownership is set to root:root | CIS Docker v1.6.0 L2 Docker Linux | Unix | ACCESS CONTROL |
3.18 Verify that daemon.json file permissions are set to 644 or more restrictive | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
4.3 Do not install unnecessary packages in the container | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
4.3 Enable Auditing of File Metadata Modification Events | CIS Oracle Solaris 11.4 L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.3 Ensure that unnecessary packages are not installed in the container | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
4.4 Ensure images are scanned and rebuilt to include security patches | CIS Docker v1.6.0 L1 Docker Linux | Unix | RISK ASSESSMENT |
4.4 Rebuild the images to include security patches | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
4.5 Enable Content trust for Docker | CIS Docker 1.13.0 v1.0.0 L2 Docker | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.7 Ensure update instructions are not used alone in Dockerfiles | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
4.9 Ensure that COPY is used instead of ADD in Dockerfiles | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
4.10 Ensure secrets are not stored in Dockerfiles | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
4.12 Ensure all signed artifacts are validated | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
5.5 Do not mount sensitive host system directories on containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
5.9 Ensure that only needed ports are open on the container | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
5.9 Open only needed ports on container | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
5.11 Set container CPU priority appropriately | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.12 Mount container's root filesystem as read only | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | CONFIGURATION MANAGEMENT |
5.14 Bind incoming container traffic to a specific host interface | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | |
5.15 Do not share the host's process namespace | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.15 Do not share the host's process namespace | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.15 Ensure that the 'on-failure' container restart policy is set to '5' | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
5.15 Set the 'on-failure' container restart policy to 5 | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | |
5.16 Do not share the host's process namespace | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | |
5.17 Do not directly expose host devices to containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Ensure that the host's IPC namespace is not shared | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.18 Override default ulimit at runtime only if needed | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.22 Ensure the default seccomp profile is not Disabled | CIS Docker v1.6.0 L1 Docker Linux | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.24 Confirm cgroup usage | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.29 Ensure that the PIDs cgroup limit is used | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
6.1 Perform regular security audits of your host system and containers | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | |
6.4 Backup container data | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | |
7.2 Ensure that swarm services are bound to a specific host interface | CIS Docker v1.6.0 L1 Docker Swarm | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.7 Ensure that node certificates are rotated as appropriate | CIS Docker v1.6.0 L1 Docker Swarm | Unix | IDENTIFICATION AND AUTHENTICATION |
Check if this is a Docker Vessel/Host | CIS Docker 1.12.0 v1.0.0 L2 Docker | Unix | |
Check if this is a Docker Vessel/Host | CIS Docker 1.6 v1.0.0 L1 Docker | Unix | |
Check if this is a Docker Vessel/Host | CIS Docker 1.6 v1.0.0 L2 Docker | Unix | |
Check if this is a Docker Vessel/Host | CIS Docker v1.6.0 L1 Docker Swarm | Unix | |
CIS_Docker_1.12.0_v1.0.0_L2.audit Level 2 | CIS Docker 1.12.0 v1.0.0 L2 Docker | Unix | |