5.30 Ensure that Docker's default bridge "docker0" is not used

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

You should not use Docker's default bridge docker0 Instead you should use Docker's user-defined networks for container networking.

Docker connects virtual interfaces created in bridge mode to a common bridge called docker0 This default networking model is vulnerable to ARP spoofing and MAC flooding attacks as there is no filtering applied to it.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

You should follow the Docker documentation and set up a user-defined network. All the containers should be run in this network.

Impact:

User-defined networks need to be configured and managed in line with organizational security policy.

See Also

https://workbench.cisecurity.org/benchmarks/16041