Use trusted base images for containers

Details

https://titanous.com/posts/docker-insecurity

2.https://registry.hub.docker.com/

3.http://blog.docker.com/2014/10/docker-1-3-signed-images-process-injection-security-options-mac-shared-directories/

4.https://github.com/docker/docker/issues/8093

5.http://docs.docker.com/reference/commandline/cli/#pull

6.https://github.com/docker/docker/pull/11109

7.https://blog.docker.com/2015/11/docker-trusted-registry-1-4/

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure and use Docker Content trust.Impact-None.Default Value-Not Applicable.

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles