1.3 Harden the container host

Information

https://docs.docker.com/articles/security/
2.https://benchmarks.cisecurity.org/downloads/multiform/index.cfm
3.http://docs.docker.com/articles/security/#other-kernel-security-features
4.https://grsecurity.net/
5.https://en.wikibooks.org/wiki/Grsecurity
6.https://pax.grsecurity.net/
7.http://en.wikipedia.org/wiki/PaX
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

You may consider various CIS Security Benchmarks for your container host. If you have
other security guidelines or regulatory requirements to adhere to, please follow them as
suitable in your environment.Additionally, you can run a kernel with grsecurity and PaX. This would add many safety
checks, both at compile-time and run-time. It is also designed to defeat many exploits and
has powerful security features. These features do not require Docker-specific
configuration, since those security features apply system-wide, independent of containers.Impact-None.Default Value-By default, host has factory settings. It is not hardened.

See Also

https://workbench.cisecurity.org/files/517

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7, CSCv7|5

Plugin: Unix

Control ID: f33c374583c11348cac2bdb2a1eb42a91ae6b4f2c6bd78a99f08a9601a29e9d5