CIS Docker v1.8.0 L2 OS Linux

Audit Details

Name: CIS Docker v1.8.0 L2 OS Linux

Updated: 9/24/2025

Authority: CIS

Plugin: Unix

Revision: 1.0

Estimated Item Count: 32

File Details

Filename: CIS_Docker_v1.8.0_L2_OS_Linux.audit

Size: 96.2 kB

MD5: a75d1fb92a08637f8f398c604afecb46
SHA256: 3eacd4ce708abe269d165936e0b9387c8d102cd65cb0f706511a11dc3f54d7b1

Audit Items

DescriptionCategories
1.1.7 Ensure auditing is configured for Docker files and directories - docker.service

AUDIT AND ACCOUNTABILITY

1.1.8 Ensure auditing is configured for Docker files and directories - containerd.sock

AUDIT AND ACCOUNTABILITY

1.1.9 Ensure auditing is configured for Docker files and directories - docker.sock

AUDIT AND ACCOUNTABILITY

1.1.10 Ensure auditing is configured for Docker files and directories - /etc/default/docker

AUDIT AND ACCOUNTABILITY

1.1.11 Ensure auditing is configured for Docker files and directories - /etc/docker/daemon.json

AUDIT AND ACCOUNTABILITY

1.1.12 Ensure auditing is configured for Docker files and directories - /etc/containerd/config.toml

AUDIT AND ACCOUNTABILITY

1.1.13 Ensure auditing is configured for Docker files and directories - /etc/sysconfig/docker

AUDIT AND ACCOUNTABILITY

1.1.14 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd

AUDIT AND ACCOUNTABILITY

1.1.15 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim

AUDIT AND ACCOUNTABILITY

1.1.16 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v1

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v2

AUDIT AND ACCOUNTABILITY

1.1.18 Ensure auditing is configured for Docker files and directories - /usr/bin/runc

AUDIT AND ACCOUNTABILITY

2.10 Enable user namespace support

SYSTEM AND SERVICES ACQUISITION

2.11 Ensure the default cgroup usage has been confirmed

SYSTEM AND SERVICES ACQUISITION

2.12 Ensure base device size is not changed until needed

CONFIGURATION MANAGEMENT

2.13 Ensure that authorization for Docker client commands is enabled

ACCESS CONTROL

2.14 Ensure centralized and remote logging is configured

AUDIT AND ACCOUNTABILITY

2.18 Ensure that a daemon-wide custom seccomp profile is applied if appropriate

SYSTEM AND SERVICES ACQUISITION

3.17 Ensure that the daemon.json file ownership is set to root:root

ACCESS CONTROL

3.18 Ensure that daemon.json file permissions are set to 644 or more restrictive

ACCESS CONTROL, MEDIA PROTECTION

3.19 Ensure that the /etc/default/docker file ownership is set to root:root

ACCESS CONTROL

3.20 Ensure that the /etc/default/docker file permissions are set to 644 or more restrictively

ACCESS CONTROL, MEDIA PROTECTION

3.21 Ensure that the /etc/sysconfig/docker file permissions are set to 644 or more restrictively

ACCESS CONTROL, MEDIA PROTECTION

3.22 Ensure that the /etc/sysconfig/docker file ownership is set to root:root

ACCESS CONTROL

4.5 Ensure Content trust for Docker is Enabled

SYSTEM AND COMMUNICATIONS PROTECTION

4.8 Ensure setuid and setgid permissions are removed

ACCESS CONTROL

4.11 Ensure only verified packages are installed

SYSTEM AND SERVICES ACQUISITION

5.3 Ensure that, if applicable, SELinux security options are set

SYSTEM AND INFORMATION INTEGRITY

5.23 Ensure that docker exec commands are not used with the privileged option

ACCESS CONTROL

5.24 Ensure that docker exec commands are not used with the user=root option

ACCESS CONTROL

5.30 Ensure that Docker's default bridge "docker0" is not used

CONFIGURATION MANAGEMENT

CIS_Docker_v1.8.0_L2_OS_Linux.audit from CIS Docker Benchmark v1.8.0