2.8 Do not bind Docker to another IP/Port or a Unix socket

Information

https://docs.docker.com/articles/basics/#bind-docker-to-another-hostport-or-a-unix-socket

Solution

Do not bind the Docker daemon to any IP and Port or a non-default Unix socket.For example, do not start the Docker daemon as below-$> docker -H tcp-//10.1.2.3-2375 -H unix-///var/run/example.sock -d

Impact-No one can have full access to Docker daemon except 'root'. Alternatively, you should
configure the TLS authentication for Docker and Docker Swarm APIs if you want to bind
the Docker daemon to any other IP and Port.

Default Value-By default, Docker daemon binds to a non-networked Unix socket.

See Also

https://workbench.cisecurity.org/files/514

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7b.

Plugin: Unix

Control ID: 03dcda01d839d3789720565adf2d6cc7547038d8a1921e87e87f72320bedf230