Skip to content

Commit 9c0002d

Browse files
committed
update control 2.8
Signed-off-by: Patrick Münch <patrick.muench1111@gmail.com>
1 parent 344a41b commit 9c0002d

2 files changed

Lines changed: 14 additions & 5 deletions

File tree

controls/docker_host_os_level1.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@
252252
title 'Audit Docker files and directories - /usr/bin/docker-runc'
253253
desc 'Apart from auditing your regular Linux file system and system calls, audit all Docker related files and directories. Docker daemon runs with \'root\' privileges. Its behavior depends on some key files and directories. /usr/bin/docker-runc is one such file. Docker now relies on containerd and runC to spawn containers. It must be audited, if applicable.'
254254
tag 'host'
255-
ref 'System auditing', url:'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
255+
ref 'System auditing', url: 'https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/chap-system_auditing.html'
256256
ref 'Containerd integration', url: 'https://github.com/docker/docker/pull/20662'
257257
ref 'Containerd tools', url: 'https://containerd.tools/'
258258
ref 'Opencontainers runc repository', url: 'https://github.com/opencontainers/runc'

controls/docker_level2.rb

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,14 +61,23 @@
6161
impact 1.0
6262
title 'Enable user namespace support'
6363
desc 'Enable user namespace support in Docker daemon to utilize container user to host user re-mapping. This recommendation is beneficial where containers you are using do not have an explicit container user defined in the container image. If container images that you are using have a pre-defined non-root user, this recommendation may be skipped since this feature is still in its infancy and might give you unpredictable issues and complexities.'
64-
ref 'http://man7.org/linux/man-pages/man7/user_namespaces.7.html'
65-
ref 'https://docs.docker.com/engine/reference/commandline/daemon/'
66-
ref 'http://events.linuxfoundation.org/sites/events/files/slides/User%20Namespaces%20-%20ContainerCon%202015%20-%2016-9-final_0.pdf'
67-
ref 'https://github.com/docker/docker/issues/21050'
64+
tag 'daemon'
65+
ref 'User namespeces', url: 'http://man7.org/linux/man-pages/man7/user_namespaces.7.html'
66+
ref 'Docker daemon configuration', url: 'https://docs.docker.com/engine/reference/commandline/daemon/'
67+
ref 'Routing out root: user namespaces in docker', url: 'http://events.linuxfoundation.org/sites/events/files/slides/User%20Namespaces%20-%20ContainerCon%202015%20-%2016-9-final_0.pdf'
68+
ref 'Docker images vanish when using user namespaces ', url: 'https://github.com/docker/docker/issues/21050'
6869

6970
describe json('/etc/docker/daemon.json') do
7071
its(['userns-remap']) { should eq('default') }
7172
end
73+
describe file('/etc/subuid') do
74+
it { should exist }
75+
it { should be_file }
76+
end
77+
describe file('/etc/subgid') do
78+
it { should exist }
79+
it { should be_file }
80+
end
7281
end
7382

7483
control 'cis-docker-benchmark-2.9' do

0 commit comments

Comments
 (0)