Item Search

NameAudit NamePluginCategory
1.1.7 Ensure auditing is configured for Docker files and directories - docker.serviceCIS Docker v1.7.0 L2 Docker - LinuxUnix

AUDIT AND ACCOUNTABILITY

1.2 Use the updated Linux KernelCIS Docker 1.6 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure that the version of Docker is up to dateCIS Docker v1.7.0 L1 Docker - LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

2.3 Allow Docker to make changes to iptablesCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Allow Docker to make changes to iptablesCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure aufs storage driver is not usedCIS Docker v1.7.0 L1 Docker - LinuxUnix

SYSTEM AND SERVICES ACQUISITION

2.6 Setup a local registry mirrorCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.9 Confirm default cgroup usageCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Confirm default cgroup usageCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Ensure the default cgroup usage has been confirmedCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.12 Configure centralized and remote loggingCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

AUDIT AND ACCOUNTABILITY

2.17 Ensure experimental features are avoided in productionCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.21 Avoid experimental features in productionCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Verify that docker.socket file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.3 Verify that docker.socket file ownership is set to root:rootCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.4 Verify that docker.socket file permissions are set to 644 or more restrictiveCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.4 Verify that docker.socket file permissions are set to 644 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.5 Ensure that /etc/docker directory ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix
3.5 Verify that /etc/docker directory ownership is set to root:rootCIS Docker 1.12.0 v1.0.0 L1 DockerUnix
3.5 Verify that /etc/docker directory ownership is set to root:rootCIS Docker 1.13.0 v1.0.0 L1 DockerUnix
3.6 Verify that /etc/docker directory permissions are set to 755 or more restrictiveCIS Docker 1.13.0 v1.0.0 L1 DockerUnix
3.6 Verify that /etc/docker directory permissions are set to 755 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix
3.6 Verify that /etc/docker directory permissions are set to 755 or more restrictiveCIS Docker 1.12.0 v1.0.0 L1 DockerUnix
3.9 Verify that docker-network environment file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.16 Verify that /etc/docker directory permissions are set to 755 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix
3.19 Verify that /etc/default/docker file ownership is set to root:rootCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Verify that /etc/default/docker file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.2 Ensure that containers use only trusted base imagesCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

4.6 Add HEALTHCHECK instruction to the container imageCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.6 Ensure HEALTHCHECK instructions have been added to the container imageCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.11 Install verified packages onlyCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

CONFIGURATION MANAGEMENT

5.2 Ensure SELinux security options are set, if applicableCIS Docker Community Edition v1.1.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.2 Verify SELinux security options, if applicableCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.3 Ensure Linux Kernel Capabilities are restricted within containersCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.7.0 L2 Docker - LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.10 Ensure that the host's network namespace is not sharedCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

5.13 Ensure that the container's root filesystem is mounted as read onlyCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.24 Ensure that docker exec commands are not used with the user=root optionCIS Docker v1.7.0 L2 Docker - LinuxUnix

ACCESS CONTROL

5.27 Ensure docker commands always get the latest version of the imageCIS Docker Community Edition v1.1.0 L1 DockerUnix
5.27 Ensure docker commands always get the latest version of the imageCIS Docker 1.13.0 v1.0.0 L1 DockerUnix
5.28 Ensure that Docker commands always make use of the latest version of their imageCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

6.5 Use a centralized and remote log collection serviceCIS Docker 1.6 v1.0.0 L1 DockerUnix

AUDIT AND ACCOUNTABILITY

6.12 Set EEPROM Security Mode and Log Failed Access - SPARC only. Should *not* be 'security-mode=none'.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

DKER-EE-001070 - FIPS mode must be enabled on all Docker Engine - Enterprise nodes - docker info .SecurityOptionsDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-001370 - log-opts on all Docker Engine - Enterprise nodes must be configured.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-001950 - Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001960 - Privileged Linux containers must not be used for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002100 - cgroup usage must be confirmed in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT