Information
Sensitive host system directories such as below should not be allowed to be mounted as container volumes especially in read-write mode.
Linux:
/
/boot
/dev
/etc
/lib
/proc
/sys
/usr
Windows:
%windir% (C:Windows)
%windir%system32 (C:Windowssystem32)
%programdata%
%programData%docker
C:Program Files
C:Program Files (x86)
C:Users
If sensitive directories are mounted in read-write mode, it would be possible to make changes to files within those sensitive directories. The changes might bring down security implications or unwarranted changes that could put the Docker host in compromised state.
Docker defaults to a read-write volume but the user can also mount a directory read-only. By default, no sensitive host directories are mounted on containers.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
This fix only applies to the use of Docker Engine - Enterprise.
Do not mount host sensitive directories on containers especially in read-write mode.