STIGQter STIGQter: STIG Summary: Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 19 Jul 2019: On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used.

DISA Rule

SV-104751r1_rule

Vulnerability Number

V-95613

Group Title

SRG-APP-000141

Rule Version

DKER-EE-001810

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

This fix only applies to the Docker Engine - Enterprise component of Docker Enterprise and only when it is used on a Linux host operating system.

via CLI:

Linux: As a trusted user on the underlying host operating system, edit the "/etc/docker/daemon.json" file and set the "storage-driver" property to a value that is not "aufs". If the daemon.json file does not exist, it must be created.

Restart the Docker daemon.

Check Contents

This check only applies to the Docker Engine - Enterprise component of Docker Enterprise and only when it is used on a Linux host operating system.

via CLI:

Linux: As a trusted user on the underlying host operating system, execute the following command:

docker info | grep -e "^Storage Driver:\s*aufs\s*$"

If the Storage Driver setting contains *aufs, then this is a finding. If the above command returns no values, this is not a finding.

Vulnerability Number

V-95613

Documentable

False

Rule Version

DKER-EE-001810

Severity Override Guidance

This check only applies to the Docker Engine - Enterprise component of Docker Enterprise and only when it is used on a Linux host operating system.

via CLI:

Linux: As a trusted user on the underlying host operating system, execute the following command:

docker info | grep -e "^Storage Driver:\s*aufs\s*$"

If the Storage Driver setting contains *aufs, then this is a finding. If the above command returns no values, this is not a finding.

Check Content Reference

M

Target Key

3425

Comments