Item Search

NameAudit NamePluginCategory
2.1 Ensure network traffic is restricted between containers on the default bridgeCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Ensure aufs storage driver is not usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.7 Ensure the default ulimit is configured appropriatelyCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.8 Enable user namespace support - /etc/subgidCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.8 Enable user namespace support - /etc/subuidCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.8 Enable user namespace support --userns-remap=defaultCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.10 Ensure base device size is not changed until neededCIS Docker Community Edition v1.1.0 L2 DockerUnix
2.18 Ensure containers are restricted from acquiring new privilegesCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

3.1 Ensure that docker.service file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.2 Ensure that docker.service file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.18 Ensure that daemon.json file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.2 Enable Auditing of Incoming Network ConnectionsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.3 Ensure unnecessary packages are not installed in the containerCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.4 Defend against Denial of Service AttacksCIS ISC BIND 9.0/9.5 v2.0.0Unix
4.4 Enable Auditing of Process and Privilege EventsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Ensure images are scanned and rebuilt to include security patchesCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.7 Ensure update instructions are not use alone in the DockerfileCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.8 Ensure setuid and setgid permissions are removed in the imagesCIS Docker Community Edition v1.1.0 L2 DockerUnix
4.9 Ensure COPY is used instead of ADD in DockerfileCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.10 Ensure secrets are not stored in DockerfilesCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.11 Ensure verified packages are only InstalledCIS Docker Community Edition v1.1.0 L2 DockerUnix

CONFIGURATION MANAGEMENT

5.4 Ensure privileged containers are not usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

5.5 Ensure sensitive host system directories are not mounted on containersCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.7 Ensure privileged ports are not mapped within containersCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.10.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.8 Ensure only needed ports are open on the containerCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.11 Ensure CPU priority is set appropriately on the containerCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.13 Ensure incoming container traffic is binded to a specific host interfaceCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.14 Ensure 'on-failure' container restart policy is set to '5' - 'MaximumRetryCount'CIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.14 Ensure 'on-failure' container restart policy is set to '5' - RestartPolicyNameCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.17 Ensure host devices are not directly exposed to containerCIS Docker Community Edition v1.1.0 L1 DockerUnix
5.17 Ensure host devices are not directly exposed to containersCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.19 Ensure mount propagation mode is not set to sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.20 Do not share the host's UTS namespaceCIS Docker Community Edition v1.1.0 L1 DockerUnix
5.20 Ensure the host's UTS namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.25 Ensure the container is restricted from acquiring additional privilegesCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.28 Ensure PIDs cgroup limit is usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure the minimum number of manager nodes have been created in a swarmCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

7.4 Ensure data exchanged between containers are encrypted on different nodes on the overlay networkCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.7 Ensure swarm manager auto-lock key is rotated periodicallyCIS Docker Community Edition v1.1.0 L1 DockerUnix
7.8 Ensure node certificates are rotated as appropriateCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.9 Ensure CA certificates are rotated as appropriateCIS Docker Community Edition v1.1.0 L2 DockerUnix

IDENTIFICATION AND AUTHENTICATION

Check if this is a Docker Vessel/HostCIS Docker Community Edition v1.1.0 L1 DockerUnix
DKER-EE-001190 - Docker Enterprise sensitive host system directories must not be mounted on containers.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-001240 - The Docker Enterprise hosts process namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-001250 - The Docker Enterprise hosts IPC namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-002150 - Docker Enterprise privileged ports must not be mapped within containers.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-003200 - Docker Enterprise images must be built with the USER instruction to prevent containers from running as root.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL

DKER-EE-003230 - An appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

DKER-EE-003340 - Log aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

AUDIT AND ACCOUNTABILITY