STIGQter STIGQter: STIG Summary:

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Version: 2

Release: 1 Benchmark Date: 23 Apr 2021

CheckedNameTitle
SV-235775r627452_ruleThe Docker Enterprise Per User Limit Login Session Control in the Universal Control Plane (UCP) Admin Settings must be set to an organization-defined value for all accounts and/or account types.
SV-235776r627455_ruleTCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
SV-235777r627458_ruleFIPS mode must be enabled on all Docker Engine - Enterprise nodes.
SV-235778r627461_ruleThe audit log configuration level must be set to request in the Universal Control Plane (UCP) component of Docker Enterprise.
SV-235779r627464_ruleThe host operating systems auditing policies for the Docker Engine - Enterprise component of Docker Enterprise must be set.
SV-235780r627467_ruleLDAP integration in Docker Enterprise must be configured.
SV-235781r627470_ruleA policy set using the built-in role-based access control (RBAC) capabilities in the Universal Control Plane (UCP) component of Docker Enterprise must be configured.
SV-235782r627473_ruleA policy set using the built-in role-based access control (RBAC) capabilities in the Docker Trusted Registry (DTR) component of Docker Enterprise must be set.
SV-235783r627476_ruleDocker Enterprise sensitive host system directories must not be mounted on containers.
SV-235784r627479_ruleThe Docker Enterprise hosts process namespace must not be shared.
SV-235785r627482_ruleThe Docker Enterprise hosts IPC namespace must not be shared.
SV-235786r627485_rulelog-opts on all Docker Engine - Enterprise nodes must be configured.
SV-235787r627488_ruleDocker Enterprise must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
SV-235788r627491_ruleDocker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.
SV-235789r627494_ruleThe insecure registry capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
SV-235790r627497_ruleOn Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.
SV-235791r627500_ruleThe userland proxy capability in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
SV-235792r627503_ruleExperimental features in the Docker Engine - Enterprise component of Docker Enterprise must be disabled.
SV-235793r627506_ruleThe Docker Enterprise self-signed certificates in Universal Control Plane (UCP) must be replaced with DoD trusted, signed certificates.
SV-235794r627509_ruleThe Docker Enterprise self-signed certificates in Docker Trusted Registry (DTR) must be replaced with DoD trusted, signed certificates.
SV-235795r627512_ruleThe option in Universal Control Plane (UCP) allowing users and administrators to schedule containers on all nodes, including UCP managers and Docker Trusted Registry (DTR) nodes must be disabled in Docker Enterprise.
SV-235796r627515_ruleThe Create repository on push option in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
SV-235797r627518_rulePeriodic data usage and analytics reporting in Universal Control Plane (UCP) must be disabled in Docker Enterprise.
SV-235798r627521_rulePeriodic data usage and analytics reporting in Docker Trusted Registry (DTR) must be disabled in Docker Enterprise.
SV-235799r627524_ruleAn appropriate AppArmor profile must be enabled on Ubuntu systems for Docker Enterprise.
SV-235800r627527_ruleSELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.
SV-235801r627530_ruleLinux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.
SV-235802r672378_rulePrivileged Linux containers must not be used for Docker Enterprise.
SV-235803r627536_ruleSSH must not run within Linux containers for Docker Enterprise.
SV-235804r627539_ruleOnly required ports must be open on the containers in Docker Enterprise.
SV-235805r627542_ruleDocker Enterprise hosts network namespace must not be shared.
SV-235806r627545_ruleMemory usage for all containers must be limited in Docker Enterprise.
SV-235807r627548_ruleDocker Enterprise CPU priority must be set appropriately on all containers.
SV-235808r627551_ruleAll Docker Enterprise containers root filesystem must be mounted as read only.
SV-235809r627554_ruleDocker Enterprise host devices must not be directly exposed to containers.
SV-235810r627557_ruleMount propagation mode must not set to shared in Docker Enterprise.
SV-235811r627560_ruleThe Docker Enterprise hosts UTS namespace must not be shared.
SV-235812r627563_ruleThe Docker Enterprise default seccomp profile must not be disabled.
SV-235813r627566_ruleDocker Enterprise exec commands must not be used with privileged option.
SV-235814r627569_ruleDocker Enterprise exec commands must not be used with the user option.
SV-235815r627572_rulecgroup usage must be confirmed in Docker Enterprise.
SV-235816r672380_ruleAll Docker Enterprise containers must be restricted from acquiring additional privileges.
SV-235817r627578_ruleThe Docker Enterprise hosts user namespace must not be shared.
SV-235818r627581_ruleThe Docker Enterprise socket must not be mounted inside any containers.
SV-235819r627584_ruleDocker Enterprise privileged ports must not be mapped within containers.
SV-235820r627587_ruleDocker Enterprise incoming container traffic must be bound to a specific host interface.
SV-235821r627590_ruleSAML integration must be enabled in Docker Enterprise.
SV-235822r627593_ruleThe certificate chain used by Universal Control Plane (UCP) client bundles must match what is defined in the System Security Plan (SSP) in Docker Enterprise.
SV-235823r627596_ruleDocker Enterprise Swarm manager must be run in auto-lock mode.
SV-235824r627599_ruleDocker Enterprise secret management commands must be used for managing secrets in a Swarm cluster.
SV-235825r627602_ruleThe Lifetime Minutes and Renewal Threshold Minutes Login Session Controls must be set to 10 and 0 respectively in Docker Enterprise.
SV-235826r627605_ruleDocker Secrets must be used to store configuration files and small amounts of user-generated data (up to 500 kb in size) in Docker Enterprise.
SV-235827r627608_ruleDocker Enterprise container health must be checked at runtime.
SV-235828r627611_rulePIDs cgroup limits must be used in Docker Enterprise.
SV-235829r627614_ruleThe Docker Enterprise per user limit login session control must be set per the requirements in the System Security Plan (SSP).
SV-235830r627617_ruleDocker Enterprise images must be built with the USER instruction to prevent containers from running as root.
SV-235831r627620_ruleAn appropriate Docker Engine - Enterprise log driver plugin must be configured to collect audit events from Universal Control Plane (UCP) and Docker Trusted Registry (DTR).
SV-235832r695335_ruleThe Docker Enterprise max-size and max-file json-file drivers logging options in the daemon.json configuration file must be configured to allocate audit record storage capacity for Universal Control Plane (UCP) and Docker Trusted Registry (DTR) per the requirements set forth by the System Security Plan (SSP).
SV-235833r627626_ruleAll Docker Engine - Enterprise nodes must be configured with a log driver plugin that sends logs to a remote log aggregation system (SIEM).
SV-235834r627629_ruleLog aggregation/SIEM systems must be configured to alarm when audit storage space for Docker Engine - Enterprise nodes exceed 75% usage.
SV-235835r627632_ruleLog aggregation/SIEM systems must be configured to notify SA and ISSO on Docker Engine - Enterprise audit failure events.
SV-235836r627635_ruleThe Docker Enterprise log aggregation/SIEM systems must be configured to send an alert the ISSO/ISSM when unauthorized software is installed.
SV-235837r627638_ruleDocker Enterprise network ports on all running containers must be limited to what is needed.
SV-235838r627641_ruleContent Trust enforcement must be enabled in Universal Control Plane (UCP) in Docker Enterprise.
SV-235839r627644_ruleOnly trusted, signed images must be on Universal Control Plane (UCP) in Docker Enterprise.
SV-235840r627647_ruleVulnerability scanning must be enabled for all repositories in the Docker Trusted Registry (DTR) component of Docker Enterprise.
SV-235841r627650_ruleUniversal Control Plane (UCP) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.
SV-235842r627653_ruleDocker Trusted Registry (DTR) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.
SV-235843r627656_ruleThe on-failure container restart policy must be is set to 5 in Docker Enterprise.
SV-235844r627659_ruleThe Docker Enterprise default ulimit must not be overwritten at runtime unless approved in the System Security Plan (SSP).
SV-235845r627662_ruleDocker Enterprise older Universal Control Plane (UCP) and Docker Trusted Registry (DTR) images must be removed from all cluster nodes upon upgrading.
SV-235846r627665_ruleOnly trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.
SV-235847r627668_ruleDocker Content Trust enforcement must be enabled in Universal Control Plane (UCP).
SV-235848r627671_ruleDocker Swarm must have the minimum number of manager nodes.
SV-235849r627674_ruleDocker Enterprise Swarm manager auto-lock key must be rotated periodically.
SV-235850r627677_ruleDocker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).
SV-235851r627680_ruleDocker Enterprise docker.service file ownership must be set to root:root.
SV-235852r627683_ruleDocker Enterprise docker.service file permissions must be set to 644 or more restrictive.
SV-235853r627686_ruleDocker Enterprise docker.socket file ownership must be set to root:root.
SV-235854r627689_ruleDocker Enterprise docker.socket file permissions must be set to 644 or more restrictive.
SV-235855r627692_ruleDocker Enterprise /etc/docker directory ownership must be set to root:root.
SV-235856r627695_ruleDocker Enterprise /etc/docker directory permissions must be set to 755 or more restrictive.
SV-235857r627698_ruleDocker Enterprise registry certificate file ownership must be set to root:root.
SV-235858r627701_ruleDocker Enterprise registry certificate file permissions must be set to 444 or more restrictive.
SV-235859r627704_ruleDocker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.
SV-235860r627707_ruleDocker Enterprise TLS certificate authority (CA) certificate file permissions must be set to 444 or more restrictive.
SV-235861r627710_ruleDocker Enterprise server certificate file ownership must be set to root:root.
SV-235862r627713_ruleDocker Enterprise server certificate file permissions must be set to 444 or more restrictive.
SV-235863r627716_ruleDocker Enterprise server certificate key file ownership must be set to root:root.
SV-235864r627719_ruleDocker Enterprise server certificate key file permissions must be set to 400.
SV-235865r627722_ruleDocker Enterprise socket file ownership must be set to root:docker.
SV-235866r627725_ruleDocker Enterprise socket file permissions must be set to 660 or more restrictive.
SV-235867r627728_ruleDocker Enterprise daemon.json file ownership must be set to root:root.
SV-235868r627731_ruleDocker Enterprise daemon.json file permissions must be set to 644 or more restrictive.
SV-235869r627734_ruleDocker Enterprise /etc/default/docker file ownership must be set to root:root.
SV-235870r627737_ruleDocker Enterprise /etc/default/docker file permissions must be set to 644 or more restrictive.
SV-235871r627740_ruleDocker Enterprise Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA).
SV-235872r627743_ruleDocker Enterprise data exchanged between Linux containers on different nodes must be encrypted on the overlay network.
SV-235873r627746_ruleDocker Enterprise Swarm services must be bound to a specific host interface.
SV-235874r627749_ruleDocker Enterprise Universal Control Plane (UCP) must be configured to use TLS 1.2.