Containers use only trusted base images

docker

Classification:

compliance

Framework:

cis-docker

Control:

4.2

Set up the docker integration.

Description

You should ensure that container images you use are either written from scratch or are based on another established and trusted base image downloaded over a secure channel.

Rationale

Official repositories contain Docker images curated and optimized by the Docker community or by their vendor. There is no guarantee that these images are safe and do not contain security vulnerabilities or malicious code. Caution should therefore be exercised when obtaining container images from Docker and third parties and running these images should be reviewed in line with organizational security policy.

Audit

You should review what Docker images are present on the host by executing this command: docker images

This command lists all of the container images that are currently available for use on the Docker host. You should then review the origin of each image and review its contents in line with your organization’s security policy. You can use this command to review the history of commits to the image: docker history <imageName>

Remediation

The following procedures are useful for establishing trust for a specific image. Configure and use Docker Content Trust. View the history of each Docker image to evaluate its risk, dependent on the sensitivity of the application you wish to deploy using it. Scan Docker images for vulnerabilities at regular intervals.

Impact

None

Default value

Not Applicable

References

  1. https://titanous.com/posts/docker-insecurity
  2. https://registry.hub.docker.com/
  3. http://blog.docker.com/2014/10/docker-1-3-signed-images-process-injection-security-options-mac-shared-directories/
  4. https://github.com/docker/docker/issues/8093
  5. https://docs.docker.com/engine/reference/commandline/pull/
  6. https://github.com/docker/docker/pull/11109
  7. https://blog.docker.com/2015/11/docker-trusted-registry-1-4/

CIS controls

Version 6

3 Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers