Item Search

NameAudit NamePluginCategory
1.1.2 Ensure only trusted users are allowed to control Docker daemonCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.4 Ensure only trusted users are allowed to control Docker daemonCIS Docker Community Edition v1.1.0 L1 Linux Host OSUnix

ACCESS CONTROL

1.5 Audit docker daemonCIS Docker 1.13.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.5 Ensure auditing is configured for the docker daemonCIS Docker Community Edition v1.1.0 L1 Linux Host OSUnix

AUDIT AND ACCOUNTABILITY

1.6 Keep Docker up to dateCIS Docker 1.6 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

1.6 Only allow trusted users to control Docker daemonCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

ACCESS CONTROL

1.7 Audit docker daemonCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.7 Audit docker daemonCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.8 Audit docker daemonCIS Docker 1.6 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.9 Audit Docker files and directories - /var/lib/dockerCIS Docker 1.6 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.9 Ensure auditing is configured for Docker files and directories - docker.socketCIS Docker Community Edition v1.1.0 L1 Linux Host OSUnix

AUDIT AND ACCOUNTABILITY

2.1 Do not use lxc execution driverCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.3 Set the logging levelCIS Docker 1.6 v1.0.0 L1 DockerUnix

AUDIT AND ACCOUNTABILITY

2.4 Do not use insecure registriesCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.4 Do not use insecure registriesCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.4 Do not use insecure registriesCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.4 Ensure Docker is allowed to make changes to iptablesCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Ensure insecure registries are not usedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.5 Do not use insecure registriesCIS Docker 1.6 v1.0.0 L1 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

2.7 Ensure TLS authentication for Docker daemon is configuredCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.13 Ensure operations on legacy registry (v1) are DisabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.14 Enable live restoreCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.14 Ensure live restore is EnabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.15 Ensure live restore is enabledCIS Docker v1.7.0 L1 Docker - LinuxUnix

PLANNING, SYSTEM AND SERVICES ACQUISITION

2.18 Disable Userland ProxyCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.7 Ensure that registry certificate file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.8 Ensure that registry certificate file permissions are set to 444 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.10 Verify that docker-network environment file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Ensure that Docker server certificate key file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Verify that Docker server certificate key file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Verify that Docker server certificate key file ownership is set to root:rootCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Verify that Docker server certificate key file ownership is set to root:rootCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Verify that docker-storage environment file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.14 Verify that docker-storage environment file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.16 Ensure that Docker socket file permissions are set to 660 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.16 Verify that Docker socket file permissions are set to 660 or more restrictiveCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.16 Verify that Docker socket file permissions are set to 660 or more restrictiveCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Ensure that /etc/default/docker file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Verify that /etc/default/docker file ownership is set to root:rootCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.20 Ensure that /etc/default/docker file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.20 Verify that /etc/default/docker file permissions are set to 644 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.20 Verify that /etc/default/docker file permissions are set to 644 or more restrictiveCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.23 Verify that Docker server certificate key file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.24 Verify that Docker server certificate key file permissions are set to 400CIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.31 Do not mount the Docker socket inside any containersCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.31 Ensure the Docker socket is not mounted inside any containersCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.32 Ensure that the Docker socket is not mounted inside any containersCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

DKER-EE-001940 - SELinux security options must be set on Red Hat or CentOS systems for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005270 - Docker Enterprise server certificate file ownership must be set to root:root.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005300 - Docker Enterprise server certificate key file permissions must be set to 400.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT