237 lines
18 KiB
Plaintext
237 lines
18 KiB
Plaintext
Initializing 2025-05-18T11:42:35+00:00
|
||
|
||
|
||
[1;33mSection A - Check results[0m
|
||
|
||
[1;34m[INFO][0m 1 - Host Configuration
|
||
[1;34m[INFO][0m 1.1 - Linux Hosts Specific Configuration
|
||
[1;31m[WARN][0m 1.1.1 - Ensure a separate partition for containers has been created (Automated)
|
||
[1;34m[INFO][0m 1.1.2 - Ensure only trusted users are allowed to control Docker daemon (Automated)
|
||
[1;34m[INFO][0m * Users: vagrant,git
|
||
[1;31m[WARN][0m 1.1.3 - Ensure auditing is configured for the Docker daemon (Automated)
|
||
[1;31m[WARN][0m 1.1.4 - Ensure auditing is configured for Docker files and directories -/run/containerd (Automated)
|
||
[1;31m[WARN][0m 1.1.5 - Ensure auditing is configured for Docker files and directories - /var/lib/docker (Automated)
|
||
[1;31m[WARN][0m 1.1.6 - Ensure auditing is configured for Docker files and directories - /etc/docker (Automated)
|
||
[1;31m[WARN][0m 1.1.7 - Ensure auditing is configured for Docker files and directories - docker.service (Automated)
|
||
[1;31m[WARN][0m 1.1.8 - Ensure auditing is configured for Docker files and directories - containerd.sock (Automated)
|
||
[1;31m[WARN][0m 1.1.9 - Ensure auditing is configured for Docker files and directories - docker.socket (Automated)
|
||
[1;31m[WARN][0m 1.1.10 - Ensure auditing is configured for Docker files and directories - /etc/default/docker (Automated)
|
||
[1;34m[INFO][0m 1.1.11 - Ensure auditing is configured for Dockerfiles and directories - /etc/docker/daemon.json (Automated)
|
||
[1;34m[INFO][0m * File not found
|
||
[1;31m[WARN][0m 1.1.12 - 1.1.12 Ensure auditing is configured for Dockerfiles and directories - /etc/containerd/config.toml (Automated)
|
||
[1;34m[INFO][0m 1.1.13 - Ensure auditing is configured for Docker files and directories - /etc/sysconfig/docker (Automated)
|
||
[1;34m[INFO][0m * File not found
|
||
[1;31m[WARN][0m 1.1.14 - Ensure auditing is configured for Docker files and directories - /usr/bin/containerd (Automated)
|
||
[1;31m[WARN][0m 1.1.15 - Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim (Automated)
|
||
[1;31m[WARN][0m 1.1.16 - Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v1 (Automated)
|
||
[1;31m[WARN][0m 1.1.17 - Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v2 (Automated)
|
||
[1;31m[WARN][0m 1.1.18 - Ensure auditing is configured for Docker files and directories - /usr/bin/runc (Automated)
|
||
[1;34m[INFO][0m 1.2 - General Configuration
|
||
[1;33m[NOTE][0m 1.2.1 - Ensure the container host has been Hardened (Manual)
|
||
[1;32m[PASS][0m 1.2.2 - Ensure that the version of Docker is up to date (Manual)
|
||
[1;34m[INFO][0m * Using 28.1.1 which is current
|
||
[1;34m[INFO][0m * Check with your operating system vendor for support and security maintenance for Docker
|
||
|
||
[1;34m[INFO][0m 2 - Docker daemon configuration
|
||
[1;33m[NOTE][0m 2.1 - Run the Docker daemon as a non-root user, if possible (Manual)
|
||
[1;31m[WARN][0m 2.2 - Ensure network traffic is restricted between containers on the default bridge (Scored)
|
||
[1;32m[PASS][0m 2.3 - Ensure the logging level is set to 'info' (Scored)
|
||
[1;32m[PASS][0m 2.4 - Ensure Docker is allowed to make changes to iptables (Scored)
|
||
[1;32m[PASS][0m 2.5 - Ensure insecure registries are not used (Scored)
|
||
[1;32m[PASS][0m 2.6 - Ensure aufs storage driver is not used (Scored)
|
||
[1;34m[INFO][0m 2.7 - Ensure TLS authentication for Docker daemon is configured (Scored)
|
||
[1;34m[INFO][0m * Docker daemon not listening on TCP
|
||
[1;34m[INFO][0m 2.8 - Ensure the default ulimit is configured appropriately (Manual)
|
||
[1;34m[INFO][0m * Default ulimit doesn't appear to be set
|
||
[1;31m[WARN][0m 2.9 - Enable user namespace support (Scored)
|
||
[1;32m[PASS][0m 2.10 - Ensure the default cgroup usage has been confirmed (Scored)
|
||
[1;32m[PASS][0m 2.11 - Ensure base device size is not changed until needed (Scored)
|
||
[1;31m[WARN][0m 2.12 - Ensure that authorization for Docker client commands is enabled (Scored)
|
||
[1;31m[WARN][0m 2.13 - Ensure centralized and remote logging is configured (Scored)
|
||
[1;31m[WARN][0m 2.14 - Ensure containers are restricted from acquiring new privileges (Scored)
|
||
[1;31m[WARN][0m 2.15 - Ensure live restore is enabled (Scored)
|
||
[1;31m[WARN][0m 2.16 - Ensure Userland Proxy is Disabled (Scored)
|
||
[1;34m[INFO][0m 2.17 - Ensure that a daemon-wide custom seccomp profile is applied if appropriate (Manual)
|
||
[1;34m[INFO][0m Ensure that experimental features are not implemented in production (Scored) (Deprecated)
|
||
|
||
[1;34m[INFO][0m 3 - Docker daemon configuration files
|
||
[1;32m[PASS][0m 3.1 - Ensure that the docker.service file ownership is set to root:root (Automated)
|
||
[1;32m[PASS][0m 3.2 - Ensure that docker.service file permissions are appropriately set (Automated)
|
||
[1;32m[PASS][0m 3.3 - Ensure that docker.socket file ownership is set to root:root (Automated)
|
||
[1;32m[PASS][0m 3.4 - Ensure that docker.socket file permissions are set to 644 or more restrictive (Automated)
|
||
[1;32m[PASS][0m 3.5 - Ensure that the /etc/docker directory ownership is set to root:root (Automated)
|
||
[1;32m[PASS][0m 3.6 - Ensure that /etc/docker directory permissions are set to 755 or more restrictively (Automated)
|
||
[1;34m[INFO][0m 3.7 - Ensure that registry certificate file ownership is set to root:root (Automated)
|
||
[1;34m[INFO][0m * Directory not found
|
||
[1;34m[INFO][0m 3.8 - Ensure that registry certificate file permissions are set to 444 or more restrictively (Automated)
|
||
[1;34m[INFO][0m * Directory not found
|
||
[1;34m[INFO][0m 3.9 - Ensure that TLS CA certificate file ownership is set to root:root (Automated)
|
||
[1;34m[INFO][0m * No TLS CA certificate found
|
||
[1;34m[INFO][0m 3.10 - Ensure that TLS CA certificate file permissions are set to 444 or more restrictively (Automated)
|
||
[1;34m[INFO][0m * No TLS CA certificate found
|
||
[1;34m[INFO][0m 3.11 - Ensure that Docker server certificate file ownership is set to root:root (Automated)
|
||
[1;34m[INFO][0m * No TLS Server certificate found
|
||
[1;34m[INFO][0m 3.12 - Ensure that the Docker server certificate file permissions are set to 444 or more restrictively (Automated)
|
||
[1;34m[INFO][0m * No TLS Server certificate found
|
||
[1;34m[INFO][0m 3.13 - Ensure that the Docker server certificate key file ownership is set to root:root (Automated)
|
||
[1;34m[INFO][0m * No TLS Key found
|
||
[1;34m[INFO][0m 3.14 - Ensure that the Docker server certificate key file permissions are set to 400 (Automated)
|
||
[1;34m[INFO][0m * No TLS Key found
|
||
[1;32m[PASS][0m 3.15 - Ensure that the Docker socket file ownership is set to root:docker (Automated)
|
||
[1;32m[PASS][0m 3.16 - Ensure that the Docker socket file permissions are set to 660 or more restrictively (Automated)
|
||
[1;34m[INFO][0m 3.17 - Ensure that the daemon.json file ownership is set to root:root (Automated)
|
||
[1;34m[INFO][0m * File not found
|
||
[1;34m[INFO][0m 3.18 - Ensure that daemon.json file permissions are set to 644 or more restrictive (Automated)
|
||
[1;34m[INFO][0m * File not found
|
||
[1;32m[PASS][0m 3.19 - Ensure that the /etc/default/docker file ownership is set to root:root (Automated)
|
||
[1;32m[PASS][0m 3.20 - Ensure that the /etc/default/docker file permissions are set to 644 or more restrictively (Automated)
|
||
[1;34m[INFO][0m 3.21 - Ensure that the /etc/sysconfig/docker file permissions are set to 644 or more restrictively (Automated)
|
||
[1;34m[INFO][0m * File not found
|
||
[1;34m[INFO][0m 3.22 - Ensure that the /etc/sysconfig/docker file ownership is set to root:root (Automated)
|
||
[1;34m[INFO][0m * File not found
|
||
[1;32m[PASS][0m 3.23 - Ensure that the Containerd socket file ownership is set to root:root (Automated)
|
||
[1;32m[PASS][0m 3.24 - Ensure that the Containerd socket file permissions are set to 660 or more restrictively (Automated)
|
||
|
||
[1;34m[INFO][0m 4 - Container Images and Build File
|
||
[1;31m[WARN][0m 4.1 - Ensure that a user for the container has been created (Automated)
|
||
[1;31m[WARN][0m * Running as root: vaultwarden-db
|
||
[1;31m[WARN][0m * Running as root: nginx
|
||
[1;31m[WARN][0m * Running as root: vaultwarden
|
||
[1;31m[WARN][0m * Running as root: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Running as root: gitea-db
|
||
[1;31m[WARN][0m * Running as root: gitea
|
||
[1;33m[NOTE][0m 4.2 - Ensure that containers use only trusted base images (Manual)
|
||
[1;33m[NOTE][0m 4.3 - Ensure that unnecessary packages are not installed in the container (Manual)
|
||
[1;33m[NOTE][0m 4.4 - Ensure images are scanned and rebuilt to include security patches (Manual)
|
||
[1;31m[WARN][0m 4.5 - Ensure Content trust for Docker is Enabled (Automated)
|
||
[1;31m[WARN][0m 4.6 - Ensure that HEALTHCHECK instructions have been added to container images (Automated)
|
||
[1;31m[WARN][0m * No Healthcheck found: [vagrant-vulnerable:latest]
|
||
[1;31m[WARN][0m * No Healthcheck found: [docker.gitea.com/gitea:latest]
|
||
[1;31m[WARN][0m * No Healthcheck found: [postgres:latest]
|
||
[1;31m[WARN][0m * No Healthcheck found: [nginx:latest]
|
||
[1;34m[INFO][0m 4.7 - Ensure update instructions are not used alone in the Dockerfile (Manual)
|
||
[1;34m[INFO][0m * Update instruction found: [vagrant-vulnerable:latest]
|
||
[1;34m[INFO][0m * Update instruction found: [postgres:latest]
|
||
[1;33m[NOTE][0m 4.8 - Ensure setuid and setgid permissions are removed (Manual)
|
||
[1;34m[INFO][0m 4.9 - Ensure that COPY is used instead of ADD in Dockerfiles (Manual)
|
||
[1;34m[INFO][0m * ADD in image history: [vagrant-vulnerable:latest]
|
||
[1;34m[INFO][0m * ADD in image history: [vaultwarden/server:latest]
|
||
[1;33m[NOTE][0m 4.10 - Ensure secrets are not stored in Dockerfiles (Manual)
|
||
[1;33m[NOTE][0m 4.11 - Ensure only verified packages are installed (Manual)
|
||
[1;33m[NOTE][0m 4.12 - Ensure all signed artifacts are validated (Manual)
|
||
|
||
[1;34m[INFO][0m 5 - Container Runtime
|
||
[1;32m[PASS][0m 5.1 - Ensure swarm mode is not Enabled, if not needed (Automated)
|
||
[1;32m[PASS][0m 5.2 - Ensure that, if applicable, an AppArmor Profile is enabled (Automated)
|
||
[1;31m[WARN][0m 5.3 - Ensure that, if applicable, SELinux security options are set (Automated)
|
||
[1;31m[WARN][0m * No SecurityOptions Found: vaultwarden-db
|
||
[1;31m[WARN][0m * No SecurityOptions Found: nginx
|
||
[1;31m[WARN][0m * No SecurityOptions Found: vaultwarden
|
||
[1;31m[WARN][0m * No SecurityOptions Found: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * No SecurityOptions Found: gitea-db
|
||
[1;31m[WARN][0m * No SecurityOptions Found: gitea
|
||
[1;32m[PASS][0m 5.4 - Ensure that Linux kernel capabilities are restricted within containers (Automated)
|
||
[1;32m[PASS][0m 5.5 - Ensure that privileged containers are not used (Automated)
|
||
[1;32m[PASS][0m 5.6 - Ensure sensitive host system directories are not mounted on containers (Automated)
|
||
[1;31m[WARN][0m 5.7 - Ensure sshd is not run within containers (Automated)
|
||
[1;31m[WARN][0m * Container running sshd: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Container running sshd: gitea
|
||
[1;31m[WARN][0m 5.8 - Ensure privileged ports are not mapped within containers (Automated)
|
||
[1;31m[WARN][0m * Privileged Port in use: 80 in nginx
|
||
[1;31m[WARN][0m * Privileged Port in use: 443 in nginx
|
||
[1;31m[WARN][0m 5.9 - Ensure that only needed ports are open on the container (Manual)
|
||
[1;31m[WARN][0m * Port in use: 80 in nginx
|
||
[1;31m[WARN][0m * Port in use: 443 in nginx
|
||
[1;31m[WARN][0m * Port in use: 2222 in vagrant-vulnerable-1
|
||
[1;32m[PASS][0m 5.10 - Ensure that the host's network namespace is not shared (Automated)
|
||
[1;31m[WARN][0m 5.11 - Ensure that the memory usage for containers is limited (Automated)
|
||
[1;31m[WARN][0m * Container running without memory restrictions: vaultwarden-db
|
||
[1;31m[WARN][0m * Container running without memory restrictions: nginx
|
||
[1;31m[WARN][0m * Container running without memory restrictions: vaultwarden
|
||
[1;31m[WARN][0m * Container running without memory restrictions: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Container running without memory restrictions: gitea-db
|
||
[1;31m[WARN][0m * Container running without memory restrictions: gitea
|
||
[1;31m[WARN][0m 5.12 - Ensure that CPU priority is set appropriately on containers (Automated)
|
||
[1;31m[WARN][0m * Container running without CPU restrictions: vaultwarden-db
|
||
[1;31m[WARN][0m * Container running without CPU restrictions: nginx
|
||
[1;31m[WARN][0m * Container running without CPU restrictions: vaultwarden
|
||
[1;31m[WARN][0m * Container running without CPU restrictions: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Container running without CPU restrictions: gitea-db
|
||
[1;31m[WARN][0m * Container running without CPU restrictions: gitea
|
||
[1;31m[WARN][0m 5.13 - Ensure that the container's root filesystem is mounted as read only (Automated)
|
||
[1;31m[WARN][0m * Container running with root FS mounted R/W: vaultwarden-db
|
||
[1;31m[WARN][0m * Container running with root FS mounted R/W: nginx
|
||
[1;31m[WARN][0m * Container running with root FS mounted R/W: vaultwarden
|
||
[1;31m[WARN][0m * Container running with root FS mounted R/W: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Container running with root FS mounted R/W: gitea-db
|
||
[1;31m[WARN][0m * Container running with root FS mounted R/W: gitea
|
||
[1;31m[WARN][0m 5.14 - Ensure that incoming container traffic is bound to a specific host interface (Automated)
|
||
[1;31m[WARN][0m * Port being bound to wildcard IP: 0.0.0.0 in nginx
|
||
[1;31m[WARN][0m * Port being bound to wildcard IP: 0.0.0.0 in nginx
|
||
[1;31m[WARN][0m * Port being bound to wildcard IP: 0.0.0.0 in vagrant-vulnerable-1
|
||
[1;32m[PASS][0m 5.15 - Ensure that the 'on-failure' container restart policy is set to '5' (Automated)
|
||
[1;32m[PASS][0m 5.16 - Ensure that the host's process namespace is not shared (Automated)
|
||
[1;32m[PASS][0m 5.17 - Ensure that the host's IPC namespace is not shared (Automated)
|
||
[1;32m[PASS][0m 5.18 - Ensure that host devices are not directly exposed to containers (Manual)
|
||
[1;34m[INFO][0m 5.19 - Ensure that the default ulimit is overwritten at runtime if needed (Manual)
|
||
[1;34m[INFO][0m * Container no default ulimit override: vaultwarden-db
|
||
[1;34m[INFO][0m * Container no default ulimit override: nginx
|
||
[1;34m[INFO][0m * Container no default ulimit override: vaultwarden
|
||
[1;34m[INFO][0m * Container no default ulimit override: vagrant-vulnerable-1
|
||
[1;34m[INFO][0m * Container no default ulimit override: gitea-db
|
||
[1;34m[INFO][0m * Container no default ulimit override: gitea
|
||
[1;32m[PASS][0m 5.20 - Ensure mount propagation mode is not set to shared (Automated)
|
||
[1;32m[PASS][0m 5.21 - Ensure that the host's UTS namespace is not shared (Automated)
|
||
[1;32m[PASS][0m 5.22 - Ensure the default seccomp profile is not Disabled (Automated)
|
||
[1;33m[NOTE][0m 5.23 - Ensure that docker exec commands are not used with the privileged option (Automated)
|
||
[1;33m[NOTE][0m 5.24 - Ensure that docker exec commands are not used with the user=root option (Manual)
|
||
[1;32m[PASS][0m 5.25 - Ensure that cgroup usage is confirmed (Automated)
|
||
[1;31m[WARN][0m 5.26 - Ensure that the container is restricted from acquiring additional privileges (Automated)
|
||
[1;31m[WARN][0m * Privileges not restricted: vaultwarden-db
|
||
[1;31m[WARN][0m * Privileges not restricted: nginx
|
||
[1;31m[WARN][0m * Privileges not restricted: vaultwarden
|
||
[1;31m[WARN][0m * Privileges not restricted: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Privileges not restricted: gitea-db
|
||
[1;31m[WARN][0m * Privileges not restricted: gitea
|
||
[1;31m[WARN][0m 5.27 - Ensure that container health is checked at runtime (Automated)
|
||
[1;31m[WARN][0m * Health check not set: vaultwarden-db
|
||
[1;31m[WARN][0m * Health check not set: nginx
|
||
[1;31m[WARN][0m * Health check not set: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * Health check not set: gitea-db
|
||
[1;31m[WARN][0m * Health check not set: gitea
|
||
[1;34m[INFO][0m 5.28 - Ensure that Docker commands always make use of the latest version of their image (Manual)
|
||
[1;31m[WARN][0m 5.29 - Ensure that the PIDs cgroup limit is used (Automated)
|
||
[1;31m[WARN][0m * PIDs limit not set: vaultwarden-db
|
||
[1;31m[WARN][0m * PIDs limit not set: nginx
|
||
[1;31m[WARN][0m * PIDs limit not set: vaultwarden
|
||
[1;31m[WARN][0m * PIDs limit not set: vagrant-vulnerable-1
|
||
[1;31m[WARN][0m * PIDs limit not set: gitea-db
|
||
[1;31m[WARN][0m * PIDs limit not set: gitea
|
||
[1;32m[PASS][0m 5.30 - Ensure that Docker's default bridge 'docker0' is not used (Manual)
|
||
[1;32m[PASS][0m 5.31 - Ensure that the host's user namespaces are not shared (Automated)
|
||
[1;32m[PASS][0m 5.32 - Ensure that the Docker socket is not mounted inside any containers (Automated)
|
||
|
||
[1;34m[INFO][0m 6 - Docker Security Operations
|
||
[1;34m[INFO][0m 6.1 - Ensure that image sprawl is avoided (Manual)
|
||
[1;34m[INFO][0m * There are currently: 6 images
|
||
[1;34m[INFO][0m 6.2 - Ensure that container sprawl is avoided (Manual)
|
||
[1;34m[INFO][0m * There are currently a total of 6 containers, with 6 of them currently running
|
||
|
||
[1;34m[INFO][0m 7 - Docker Swarm Configuration
|
||
[1;32m[PASS][0m 7.1 - Ensure that the minimum number of manager nodes have been created in a swarm (Automated) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.2 - Ensure that swarm services are bound to a specific host interface (Automated) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.3 - Ensure that all Docker swarm overlay networks are encrypted (Automated)
|
||
[1;32m[PASS][0m 7.4 - Ensure that Docker's secret management commands are used for managing secrets in a swarm cluster (Manual) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.5 - Ensure that swarm manager is run in auto-lock mode (Automated) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.6 - Ensure that the swarm manager auto-lock key is rotated periodically (Manual) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.7 - Ensure that node certificates are rotated as appropriate (Manual) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.8 - Ensure that CA certificates are rotated as appropriate (Manual) (Swarm mode not enabled)
|
||
[1;32m[PASS][0m 7.9 - Ensure that management plane traffic is separated from data plane traffic (Manual) (Swarm mode not enabled)
|
||
|
||
|
||
[1;33mSection C - Score[0m
|
||
|
||
[1;34m[INFO][0m Checks: 117
|
||
[1;34m[INFO][0m Score: 1
|
||
|