-
Notifications
You must be signed in to change notification settings - Fork 114
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
dev-sec CI
committed
Jun 18, 2020
1 parent
ce4cc9c
commit 656e61c
Showing
2 changed files
with
135 additions
and
103 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,110 +1,111 @@ | ||
--- | ||
name: cis-docker-benchmark | ||
title: CIS Docker Benchmark Profile | ||
maintainer: DevSec Hardening Framework Team | ||
copyright: DevSec Hardening Framework Team | ||
copyright_email: [email protected] | ||
license: Apache-2.0 | ||
summary: An InSpec Compliance Profile for the CIS Docker Benchmark | ||
version: 2.1.0 | ||
version: 1.3.1 | ||
inspec_version: '>= 2.3.23' | ||
attributes: | ||
- name: container_user | ||
required: false | ||
description: 'define user within containers.' | ||
value: 'ubuntu' | ||
type: string | ||
- name: container_capadd | ||
required: true | ||
description: 'define needed capabilities for containers.' | ||
type: string | ||
value: NET_ADMIN,SYS_ADMIN | ||
- name: app_armor_profile | ||
required: false | ||
description: 'define apparmor profile for Docker containers.' | ||
value: 'docker-default' | ||
type: string | ||
- name: selinux_profile | ||
required: false | ||
description: 'define SELinux profile for Docker containers.' | ||
value: label:level:s0-s0:c1023 | ||
type: string | ||
- name: trusted_user | ||
required: false | ||
description: 'define trusted user to control Docker daemon.' | ||
value: vagrant | ||
type: string | ||
- name: managable_container_number | ||
required: true | ||
description: 'keep number of containers on a host to a manageable total.' | ||
value: 25 | ||
type: numeric | ||
- name: benchmark_version | ||
required: true | ||
description: 'to execute also the old controls from previous benchmarks. to execute the controls, define the value as 1.12.0' | ||
type: string | ||
value: 1.12.0 | ||
- name: registry_cert_path | ||
required: true | ||
description: 'directory contains various Docker registry directories.' | ||
value: '/etc/docker/certs.d' | ||
type: string | ||
- name: registry_name | ||
required: true | ||
description: 'directory contain certificate certain Docker registry.' | ||
value: '/etc/docker/certs.d/registry_hostname:port' | ||
type: string | ||
- name: registry_ca_file | ||
required: false | ||
description: 'directory contain certificate certain Docker registry.' | ||
value: '/etc/docker/certs.d/registry_hostname:port/ca.crt' | ||
type: string | ||
- name: daemon_tlscacert | ||
required: false | ||
description: 'Trust certs signed only by this CA' | ||
value: '/etc/docker/ssl/ca.pem' | ||
type: string | ||
- name: daemon_tlscert | ||
required: false | ||
description: 'Path to TLS certificate file' | ||
value: '/etc/docker/ssl/server_cert.pem' | ||
type: string | ||
- name: daemon_tlskey | ||
required: false | ||
description: 'Path to TLS key file' | ||
value: '/etc/docker/ssl/server_key.pem' | ||
type: string | ||
- name: authorization_plugin | ||
required: false | ||
description: 'define authorization plugin to manage access to Docker daemon.' | ||
value: 'authz-broker' | ||
type: string | ||
- name: log_driver | ||
required: false | ||
description: 'define preferable way to store logs.' | ||
value: 'syslog' | ||
type: string | ||
- name: log_opts | ||
required: false | ||
description: 'define Docker daemon log-opts.' | ||
value: syslog-address | ||
type: string | ||
- name: swarm_mode | ||
required: false | ||
description: 'define the swarm mode, `active` or `inactive`' | ||
value: inactive | ||
type: string | ||
- name: swarm_max_manager_nodes | ||
required: false | ||
description: 'number of manager nodes in a swarm' | ||
value: 3 | ||
type: numeric | ||
- name: swarm_port | ||
required: false | ||
description: 'port of the swarm node' | ||
value: 2377 | ||
type: numeric | ||
- name: seccomp_default_profile | ||
required: false | ||
description: 'define the default seccomp profile' | ||
value: 'default' | ||
type: string | ||
- name: container_user | ||
required: false | ||
description: 'define user within containers.' | ||
value: 'ubuntu' | ||
type: string | ||
- name: container_capadd | ||
required: true | ||
description: 'define needed capabilities for containers.' | ||
type: string | ||
value: NET_ADMIN,SYS_ADMIN | ||
- name: app_armor_profile | ||
required: false | ||
description: 'define apparmor profile for Docker containers.' | ||
value: 'docker-default' | ||
type: string | ||
- name: selinux_profile | ||
required: false | ||
description: 'define SELinux profile for Docker containers.' | ||
value: label:level:s0-s0:c1023 | ||
type: string | ||
- name: trusted_user | ||
required: false | ||
description: 'define trusted user to control Docker daemon.' | ||
value: vagrant | ||
type: string | ||
- name: managable_container_number | ||
required: true | ||
description: 'keep number of containers on a host to a manageable total.' | ||
value: 25 | ||
type: numeric | ||
- name: benchmark_version | ||
required: true | ||
description: 'to execute also the old controls from previous benchmarks. to execute the controls, define the value as 1.12.0' | ||
type: string | ||
value: 1.12.0 | ||
- name: registry_cert_path | ||
required: true | ||
description: 'directory contains various Docker registry directories.' | ||
value: '/etc/docker/certs.d' | ||
type: string | ||
- name: registry_name | ||
required: true | ||
description: 'directory contain certificate certain Docker registry.' | ||
value: '/etc/docker/certs.d/registry_hostname:port' | ||
type: string | ||
- name: registry_ca_file | ||
required: false | ||
description: 'directory contain certificate certain Docker registry.' | ||
value: '/etc/docker/certs.d/registry_hostname:port/ca.crt' | ||
type: string | ||
- name: daemon_tlscacert | ||
required: false | ||
description: 'Trust certs signed only by this CA' | ||
value: '/etc/docker/ssl/ca.pem' | ||
type: string | ||
- name: daemon_tlscert | ||
required: false | ||
description: 'Path to TLS certificate file' | ||
value: '/etc/docker/ssl/server_cert.pem' | ||
type: string | ||
- name: daemon_tlskey | ||
required: false | ||
description: 'Path to TLS key file' | ||
value: '/etc/docker/ssl/server_key.pem' | ||
type: string | ||
- name: authorization_plugin | ||
required: false | ||
description: 'define authorization plugin to manage access to Docker daemon.' | ||
value: 'authz-broker' | ||
type: string | ||
- name: log_driver | ||
required: false | ||
description: 'define preferable way to store logs.' | ||
value: 'syslog' | ||
type: string | ||
- name: log_opts | ||
required: false | ||
description: 'define Docker daemon log-opts.' | ||
value: syslog-address | ||
type: string | ||
- name: swarm_mode | ||
required: false | ||
description: 'define the swarm mode, `active` or `inactive`' | ||
value: inactive | ||
type: string | ||
- name: swarm_max_manager_nodes | ||
required: false | ||
description: 'number of manager nodes in a swarm' | ||
value: 3 | ||
type: numeric | ||
- name: swarm_port | ||
required: false | ||
description: 'port of the swarm node' | ||
value: 2377 | ||
type: numeric | ||
- name: seccomp_default_profile | ||
required: false | ||
description: 'define the default seccomp profile' | ||
value: 'default' | ||
type: string |