DKER-EE-002400 - Docker Enterprise Swarm manager must be run in auto-lock mode.

Information

Run Docker swarm manager in auto-lock mode.

When Docker restarts, both the TLS key used to encrypt communication among swarm nodes, and the key used to encrypt and decrypt Raft logs on disk, are loaded into each manager node's memory. Protect the mutual TLS encryption key and the key used to encrypt and decrypt Raft logs at rest. This protection could be enabled by initializing swarm with --autolock flag.

With --autolock enabled, when Docker restarts, unlock the swarm first, using a key encryption key generated by Docker when the swarm was initialized.

Solution

If initializing swarm, use the below command.

docker swarm init --autolock
If setting --autolock on an existing swarm manager node, use the below command.

docker swarm update --autolock

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(2)(b), CAT|II, CCI|CCI-000186, Rule-ID|SV-235823r627596_rule, STIG-ID|DKER-EE-002400, STIG-Legacy|SV-105141, STIG-Legacy|V-96003, Vuln-ID|V-235823

Plugin: Unix

Control ID: 9700556fccf6428e2c789d8aebbea6abf37666d846e4a05f0449ba0e18eb55d0