| 1.1.7 Ensure auditing is configured for Docker files and directories - docker.service | AUDIT AND ACCOUNTABILITY | 
| 1.1.8 Ensure auditing is configured for Docker files and directories - containerd.sock | AUDIT AND ACCOUNTABILITY | 
| 1.1.9 Ensure auditing is configured for Docker files and directories - docker.sock | AUDIT AND ACCOUNTABILITY | 
| 1.1.10 Ensure auditing is configured for Docker files and directories - /etc/default/docker | AUDIT AND ACCOUNTABILITY | 
| 1.1.11 Ensure auditing is configured for Docker files and directories - /etc/docker/daemon.json | AUDIT AND ACCOUNTABILITY | 
| 1.1.12 Ensure auditing is configured for Docker files and directories - /etc/containerd/config.toml | AUDIT AND ACCOUNTABILITY | 
| 1.1.13 Ensure auditing is configured for Docker files and directories - /etc/sysconfig/docker | AUDIT AND ACCOUNTABILITY | 
| 1.1.14 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd | AUDIT AND ACCOUNTABILITY | 
| 1.1.15 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim | AUDIT AND ACCOUNTABILITY | 
| 1.1.16 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v1 | AUDIT AND ACCOUNTABILITY | 
| 1.1.17 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v2 | AUDIT AND ACCOUNTABILITY | 
| 1.1.18 Ensure auditing is configured for Docker files and directories - /usr/bin/runc | AUDIT AND ACCOUNTABILITY | 
| 2.10 Enable user namespace support | SYSTEM AND SERVICES ACQUISITION | 
| 2.11 Ensure the default cgroup usage has been confirmed | SYSTEM AND SERVICES ACQUISITION | 
| 2.12 Ensure base device size is not changed until needed | CONFIGURATION MANAGEMENT | 
| 2.13 Ensure that authorization for Docker client commands is enabled | ACCESS CONTROL | 
| 2.14 Ensure centralized and remote logging is configured | AUDIT AND ACCOUNTABILITY | 
| 2.18 Ensure that a daemon-wide custom seccomp profile is applied if appropriate | SYSTEM AND SERVICES ACQUISITION | 
| 3.17 Ensure that the daemon.json file ownership is set to root:root | ACCESS CONTROL | 
| 3.18 Ensure that daemon.json file permissions are set to 644 or more restrictive | ACCESS CONTROL, MEDIA PROTECTION | 
| 3.19 Ensure that the /etc/default/docker file ownership is set to root:root | ACCESS CONTROL | 
| 3.20 Ensure that the /etc/default/docker file permissions are set to 644 or more restrictively | ACCESS CONTROL, MEDIA PROTECTION | 
| 3.21 Ensure that the /etc/sysconfig/docker file permissions are set to 644 or more restrictively | ACCESS CONTROL, MEDIA PROTECTION | 
| 3.22 Ensure that the /etc/sysconfig/docker file ownership is set to root:root | ACCESS CONTROL | 
| 4.5 Ensure Content trust for Docker is Enabled | SYSTEM AND COMMUNICATIONS PROTECTION | 
| 4.8 Ensure setuid and setgid permissions are removed | ACCESS CONTROL | 
| 4.11 Ensure only verified packages are installed | SYSTEM AND SERVICES ACQUISITION | 
| 5.3 Ensure that, if applicable, SELinux security options are set | SYSTEM AND INFORMATION INTEGRITY | 
| 5.23 Ensure that  docker exec commands are not used with the privileged option | ACCESS CONTROL | 
| 5.24 Ensure that docker exec commands are not used with the user=root option | ACCESS CONTROL | 
| 5.30 Ensure that Docker's default bridge "docker0" is not used | CONFIGURATION MANAGEMENT | 
| CIS_Docker_v1.8.0_L2_OS_Linux.audit from CIS Docker Benchmark v1.8.0 |  |