5.5 Ensure sensitive host system directories are not mounted on containers

Information

Sensitive host system directories such as below should not be allowed to be mounted as container volumes especially in read-write mode.
/
/boot
/dev
/etc
/lib
/proc
/sys
/usr
Rationale:
If sensitive directories are mounted in read-write mode, it would be possible to make changes to files within those sensitive directories. The changes might bring down security implications or unwarranted changes that could put the Docker host in compromised state.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Do not mount host sensitive directories on containers especially in read-write mode.
Impact:
None.
Default Value:
Docker defaults to a read-write volume but you can also mount a directory read-only. By default, no sensitive host directories are mounted on containers.

See Also

https://workbench.cisecurity.org/files/1726

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7b., CSCv6|14

Plugin: Unix

Control ID: b0d66a2dd8354955f33a44d4035a5a353759c94253fd6d6343a93896b5adbc64