Run swarm manager in auto-lock mode

Details

Run Docker swarm manager in auto-lock mode.

Rationale:

When Docker restarts, both the TLS key used to encrypt communication among swarm nodes, and the key used to encrypt and decrypt Raft logs on disk, are loaded into each manager node’s memory. You should protect the mutual TLS encryption key and the key used to encrypt and decrypt Raft logs at rest. This protection could be enabled by initializing swarm with –autolock flag.

With –autolock enabled, when Docker restarts, you must unlock the swarm first, using a key encryption key generated by Docker when the swarm was initialized.

Solution

If you are initializing swarm, use the below command.

docker swarm init –autolock

If you want to set –autolock on an existing swarm manager node, use the below command.

docker swarm update –autolock

Impact:

A swarm in auto-lock mode won’t recover from a re-start without manual intervention from a user to enter the unlock key. In some deployments, this might not be good for availability.

Default Value:

By default, swarm manager does not run in auto-lock mode.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles