DKER-EE-004260 - Only trusted, signed images must be stored in Docker Trusted Registry (DTR) in Docker Enterprise.


The Universal Control Plane (UCP) and DTR components of Docker Enterprise can be used in concert to perform an integrity check of organization-defined software at startup. In the context of Docker Enterprise, software would be analogous to Docker images that have been pulled from trusted or untrusted sources. Docker Hub is the most common upstream endpoint for retrieving Docker images. However, only 'Docker Certified' images on Docker Hub are considered trusted and come with SLAs and trusted signatures from their respective vendors. All other images from Docker Hub or other external registries must be carefully inspected and triaged prior to use. Docker Content Trust (DCT) provides for content integrity checking mechanisms on Docker images. DCT can be combined with LDAP, DTR and UCP to enforce image signatures from users/accounts in LDAP. Therefore, to meet the requirements of this control, it is imperative that UCP has LDAP integration enabled and that content trust enforcement is enabled and properly configured.

Satisfies: SRG-APP-000475, SRG-APP-000480, SRG-APP-000484, SRG-APP-000485, SRG-APP-000386

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.


This fix only applies to the DTR component of Docker Enterprise.

Store only trusted, signed images in DTR.

via CLI:

Linux: Execute the following commands as a user with access to the repository in DTR for which image signing is being enabled:

docker login [dtr_url]
docker trust signer add --key [ucp_client_bundle_cert].pem [ucp_user] [dtr_url]/[namespace]/[imageName]
docker trust key load [ucp_client_bundle_key].pem
docker tag [source_image] [dtr_url]/[namespace]/[imageName]:[tag]
docker push [dtr_url]/[namespace]/[imageName]:[tag]

See Also

Item Details


References: 800-53|CM-7(5)(b), 800-53|SI-7(1), 800-53|SI-7(5), 800-53|SI-7(8), CAT|II, CCI|CCI-001774, CCI|CCI-002710, CCI|CCI-002715, CCI|CCI-002723, CCI|CCI-002724, Rule-ID|SV-235846r627665_rule, STIG-ID|DKER-EE-004260, STIG-Legacy|SV-104865, STIG-Legacy|V-95727, Vuln-ID|V-235846

Plugin: Unix

Control ID: 9bfabf6a127c9b970a1f912db7578163edc2181c6f8d856d0cce5e1b3620379d