Skip to content

Commit 65ed726

Browse files
committed
update control 2.1 to 2.7
Signed-off-by: Patrick Münch <patrick.muench1111@gmail.com>
1 parent e29b4f1 commit 65ed726

1 file changed

Lines changed: 16 additions & 14 deletions

File tree

controls/docker_level1.rb

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@
6060
impact 1.0
6161
title 'Restrict network traffic between containers'
6262
desc 'By default, all network traffic is allowed between containers on the same host. If not desired, restrict all the intercontainer communication. Link specific containers together that require inter communication.'
63-
ref 'https://docs.docker.com/engine/userguide/networking/default_network/container-communication/'
64-
ref 'https://entwickler.de/online/development/docker-netzwerk-container-microservices-126443.html'
63+
tag 'daemon'
64+
ref 'Docker container networking', url: 'https://docs.docker.com/engine/userguide/networking/'
6565

6666
describe json('/etc/docker/daemon.json') do
6767
its(['icc']) { should eq(false) }
@@ -72,7 +72,8 @@
7272
impact 1.0
7373
title 'Set the logging level'
7474
desc 'Setting up an appropriate log level, configures the Docker daemon to log events that you would want to review later. A ase log level of \'info\' and above would capture all logs except debug logs. Until and unless required, you should not run docker daemon at \'debug\' log level.'
75-
ref 'https://docs.docker.com/engine/reference/commandline/daemon/'
75+
tag 'daemon'
76+
ref 'Docker daemon', url: 'https://docs.docker.com/engine/reference/commandline/daemon/'
7677

7778
describe json('/etc/docker/daemon.json') do
7879
its(['log-level']) { should eq('info') }
@@ -83,6 +84,7 @@
8384
impact 1.0
8485
title 'Allow Docker to make changes to iptables'
8586
desc 'Iptables are used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Allow the Docker daemon to make changes to the iptables.'
87+
tag 'daemon'
8688
ref 'https://docs.docker.com/v1.8/articles/networking/'
8789

8890
describe json('/etc/docker/daemon.json') do
@@ -94,7 +96,8 @@
9496
impact 1.0
9597
title 'Do not use insecure registries'
9698
desc 'Docker considers a private registry either secure or insecure. By default, registries are considered secure.'
97-
ref 'https://docs.docker.com/registry/insecure/'
99+
tag 'daemon'
100+
ref 'Insecure registry', url: 'https://docs.docker.com/registry/insecure/'
98101

99102
describe json('/etc/docker/daemon.json') do
100103
its(['insecure-registries']) { should be_empty }
@@ -105,10 +108,11 @@
105108
impact 1.0
106109
title 'Do not use the aufs storage driver'
107110
desc 'The \'aufs\' storage driver is the oldest storage driver. It is based on a Linux kernel patch-set that is unlikely to be merged into the main Linux kernel. \'aufs\' driver is also known to cause some serious kernel crashes. \'aufs\' just has legacy support from Docker. Most importantly, \'aufs\' is not a supported driver in many Linux distributions using latest Linux kernels.'
108-
ref 'https://docs.docker.com/engine/reference/commandline/cli/#daemon-storage-driver-option'
109-
ref 'https://github.com/docker/docker/issues/6047'
110-
ref 'http://muehe.org/posts/switching-docker-from-aufs-to-devicemapper/'
111-
ref 'http://jpetazzo.github.io/assets/2015-03-05-deep-dive-into-docker-storage-drivers.html#1'
111+
tag 'daemon'
112+
ref 'Docker daemon storage driver options', url: 'https://docs.docker.com/engine/reference/commandline/cli/#daemon-storage-driver-option'
113+
ref 'permission denied if chown after chmod', url: 'https://github.com/docker/docker/issues/6047'
114+
ref 'Switch from aufs to devicemapper', url: 'http://muehe.org/posts/switching-docker-from-aufs-to-devicemapper/'
115+
ref 'Deep dive into docker storage drivers', url: 'http://jpetazzo.github.io/assets/2015-03-05-deep-dive-into-docker-storage-drivers.html#1'
112116

113117
describe json('/etc/docker/daemon.json') do
114118
its(['storage-driver']) { should_not eq('aufs') }
@@ -119,10 +123,8 @@
119123
impact 1.0
120124
title 'Configure TLS authentication for Docker daemon'
121125
desc 'It is possible to make the Docker daemon to listen on a specific IP and port and any other Unix socket other than default Unix socket. Configure TLS authentication to restrict access to Docker daemon via IP and port.'
122-
ref 'https://docs.docker.com/engine/security/https/'
123-
ref 'http://www.hnwatcher.com/r/1644394/Intro-to-Docker-Swarm-Part-2-Comfiguration-Modes-and-Requirements'
124-
ref 'http://www.blackfinsecurity.com/docker-swarm-with-tls-authentication/'
125-
ref 'http://tech.paulcz.net/2016/01/secure-docker-with-tls/'
126+
tag 'daemon'
127+
ref 'Protect Docker deamon socket', url: 'https://docs.docker.com/engine/security/https/'
126128

127129
describe json('/etc/docker/daemon.json') do
128130
its(['tls']) { should eq(true) }
@@ -145,8 +147,8 @@
145147
impact 1.0
146148
title 'Set default ulimit as appropriate'
147149
desc 'ulimit provides control over the resources available to the shell and to processes started by it. Setting system resource limits judiciously saves you from many disasters such as a fork bomb. Sometimes, even friendly users and legitimate processes can overuse system resources and in-turn can make the system unusable.'
148-
tag 'Bug: default-ulimits seems broken in daemon.json https://github.com/docker/docker/issues/22309'
149-
ref 'https://docs.docker.com/engine/reference/commandline/daemon/#default-ulimits'
150+
tag 'daemon'
151+
ref 'Docker daemon deafult ulimits', url: 'https://docs.docker.com/engine/reference/commandline/daemon/#default-ulimits'
150152

151153
describe json('/etc/docker/daemon.json') do
152154
its(['default-ulimits', 'nproc']) { should eq('1024:2408') }

0 commit comments

Comments
 (0)