STIGQter STIGQter: STIG Summary: Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

Docker Enterprise Swarm services must be bound to a specific host interface.

DISA Rule

SV-235873r627746_rule

Vulnerability Number

V-235873

Group Title

SRG-APP-000142

Rule Version

DKER-EE-006270

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Rebuild the cluster and utilize the --listen-addr parameter.

Check Contents

Ensure swarm services are bound to a specific host interface.

Linux: List the network listener on port 2377/TCP (the default for docker swarm) and confirm that it is only listening on specific interfaces. For example, using ubuntu this could be done with the following command:

netstat -lt | grep -i 2377

If the swarm service is not bound to a specific host interface address, this is a finding.

Vulnerability Number

V-235873

Documentable

False

Rule Version

DKER-EE-006270

Severity Override Guidance

Ensure swarm services are bound to a specific host interface.

Linux: List the network listener on port 2377/TCP (the default for docker swarm) and confirm that it is only listening on specific interfaces. For example, using ubuntu this could be done with the following command:

netstat -lt | grep -i 2377

If the swarm service is not bound to a specific host interface address, this is a finding.

Check Content Reference

M

Target Key

5281

Comments