File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (25 lines) | stat: -rw-r--r-- 1,042 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
documentation_complete: true


title: 'Ensure SELinux support is enabled in Docker'

description: |-
    To enable the SELinux for the Docker service, the Docker service must be
    configured to run the Docker daemon with <tt>--selinux-enabled</tt> option.
    In <tt>/etc/sysconfig/docker</tt> configuration file, add or correct
    the following line to enable SELinux support in the Docker daemon:
    <pre>OPTIONS='--selinux-enabled'</pre>

rationale: |-
    If SELinux is not explicitely enabled in the Docker daemon configuration,
    Docker does not use SELinux which means Docker runs unconfined,
    and SELinux will not provide security separation for Docker container
    processes. However enabling SELinux for the Docker service prevents
    an attacker or rogue container from attacking other container processes
    and content as well as prevents taking over the host operating system.

severity: high

platform: machine  # The check uses service_... extended definition, which doesnt support offline mode

platform: machine