1.6 Only allow trusted users to control Docker daemon

Information

https://docs.docker.com/articles/security/#docker-daemon-attack-surface
2.https://www.andreas-jung.com/contents/on-docker-security-docker-group-considered-harmful
3.http://www.projectatomic.io/blog/2015/08/why-we-dont-let-non-root-users-run-docker-in-centos-fedora-or-rhel/

Solution

Remove any users from the 'docker' group that are not trusted. Additionally, do not create
a mapping of sensitive directories on host to container volumes.Impact-Rights to build and execute containers as normal user would be restricted.Default Value-Not Applicable

See Also

https://workbench.cisecurity.org/files/517

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(10)

Plugin: Unix

Control ID: 55c721db53cdeeb368b4ce7dff8c8d163fc63f3cfcddcacbc378b82a24333d88