1. Home
  2. Security Hardening
  3. CIS Docker 1.12.0 V1.0.0 L1 Docker
  4. Restrict network traffic between containers

Restrict network traffic between containers

Details

https://docs.docker.com/articles/networking

Solution

Run the docker in daemon mode and pass ‘–icc=false’ as argument.For Example,/usr/bin/dockerd –icc=false
Impact-The inter container communication would be disabled. No containers would be able to talk
to another container on the same host. If any communication between containers on the
same host is desired, then it needs to be explicitly defined using container linking.Default Value-By default, all inter container communication is allowed.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles