• Tenable
  • Audits
  • Settings
    Links
    Tenable Cloud Tenable Community & Support Tenable University
    Theme
  • Tenable
  • Plugins
  • Overview
  • Plugins Pipeline
  • Newest
  • Updated
  • Search
  • Nessus Families
  • WAS Families
  • NNM Families
  • LCE Families
  • Tenable OT Security Families
  • About Plugin Families
  • Release Notes
  • Audits
  • Overview
  • Newest
  • Updated
  • Search Audit Files
  • Search Items
  • References
  • Authorities
  • Documentation
  • Download All Audit Files
  • Indicators
  • Overview
  • Search
  • Indicators of Attack
  • Indicators of Exposure
  • CVEs
  • Overview
  • Newest
  • Updated
  • Search
  • Attack Path Techniques
  • Overview
  • Search
    • Links
    • Tenable Cloud
    • Tenable Community & Support
    • Tenable University
    • Settings
    • Theme
Detections
  • Plugins
  • Overview
  • Plugins Pipeline
  • Release Notes
  • Newest
  • Updated
  • Search
  • Nessus Families
  • WAS Families
  • NNM Families
  • LCE Families
  • Tenable OT Security Families
  • About Plugin Families
  • Audits
  • Overview
  • Newest
  • Updated
  • Search Audit Files
  • Search Items
  • References
  • Authorities
  • Documentation
  • Download All Audit Files
  • Indicators
  • Overview
  • Search
  • Indicators of Attack
  • Indicators of Exposure
Analytics
  • CVEs
  • Overview
  • Newest
  • Updated
  • Search
  • Attack Path Techniques
  • Overview
  • Search
  1. Audits
  2. CIS Docker v1.2.0 L1 Docker Engine Enterprise
  1. Audits

CIS Docker v1.2.0 L1 Docker Engine Enterprise

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Docker v1.2.0 L1 Docker Engine Enterprise

Updated: 7/20/2021

Authority: CIS

Plugin: Unix

Revision: 1.5

Estimated Item Count: 7

Audit Items

  • Items
  • Changelog
DescriptionCategories
7.2 Ensure that the minimum number of manager nodes have been created in a swarm

CONTINGENCY PLANNING

7.3 Ensure that swarm services are bound to a specific host interface

CONFIGURATION MANAGEMENT

7.4 Ensure that all Docker swarm overlay networks are encrypted

SYSTEM AND COMMUNICATIONS PROTECTION

8.1.1 Configure the LDAP authentication service
8.1.2 Use external certificates

SYSTEM AND COMMUNICATIONS PROTECTION

8.1.4 Configure applicable cluster role-based access control policies
CIS_Docker_v1.2.0_L1_Docker_Engine_Enterprise.audit from CIS Docker Benchmark v1.2.0
  • Go to Page:
  • Page 1 of 1
  • Tenable.com
  • Community & Support
  • Documentation
  • Education
  • © 2025 Tenable®, Inc. All Rights Reserved
  • Privacy Policy
  • Legal
  • 508 Compliance