STIGQter STIGQter: STIG Summary: Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

Docker Swarm must have the minimum number of manager nodes.

DISA Rule

SV-235848r627671_rule

Vulnerability Number

V-235848

Group Title

SRG-APP-000516

Rule Version

DKER-EE-005060

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If an excessive number of managers is configured, the excess can be demoted to worker using the following command:

docker node demote <ID>
Where is the node ID value of the manager to be demoted.

Check Contents

Ensure the correct range of manager nodes have been created in a swarm.

via CLI:

Linux: As a Docker EE Admin, follow the steps below using a Universal Control Plane (UCP) client bundle:

Run the following command.
docker info --format '{{ .Swarm.Managers }}'

Alternatively run the below command.

docker node ls | grep 'Leader'

Ensure the number of leaders is between 1 and 3. If the number of leaders is not 1, 2 or 3, this is a finding.

Vulnerability Number

V-235848

Documentable

False

Rule Version

DKER-EE-005060

Severity Override Guidance

Ensure the correct range of manager nodes have been created in a swarm.

via CLI:

Linux: As a Docker EE Admin, follow the steps below using a Universal Control Plane (UCP) client bundle:

Run the following command.
docker info --format '{{ .Swarm.Managers }}'

Alternatively run the below command.

docker node ls | grep 'Leader'

Ensure the number of leaders is between 1 and 3. If the number of leaders is not 1, 2 or 3, this is a finding.

Check Content Reference

M

Target Key

5281

Comments