mirror of
https://github.com/docker/docker-bench-security.git
synced 2025-01-18 16:22:33 +01:00
Add explanations for newly added features
This commit is contained in:
parent
091b4b954a
commit
e5efe2bf40
1 changed files with 58 additions and 74 deletions
132
README.md
132
README.md
|
@ -2,23 +2,29 @@
|
||||||
|
|
||||||
![Docker Bench for Security running](img/benchmark_log.png)
|
![Docker Bench for Security running](img/benchmark_log.png)
|
||||||
|
|
||||||
The Docker Bench for Security is a script that checks for dozens of common
|
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are inspired by the [CIS Docker Benchmark v1.2.0](https://www.cisecurity.org/benchmark/docker/).
|
||||||
best-practices around deploying Docker containers in production. The tests are
|
|
||||||
all automated, and are inspired by the [CIS Docker Benchmark v1.2.0](https://www.cisecurity.org/benchmark/docker/).
|
|
||||||
|
|
||||||
We are making this available as an open-source utility so the Docker community
|
The list with all tests is available [here](tests/TESTS.md).
|
||||||
can have an easy way to self-assess their hosts and docker containers against
|
|
||||||
this benchmark.
|
We are making this available as an open-source utility so the Docker community can have an easy way to self-assess their hosts and docker containers against this benchmark.
|
||||||
|
|
||||||
## Running Docker Bench for Security
|
## Running Docker Bench for Security
|
||||||
|
|
||||||
We packaged docker bench as a small container for your convenience. Note that
|
### Run from your base host
|
||||||
this container is being run with a *lot* of privilege -- sharing the host's
|
|
||||||
filesystem, pid and network namespaces, due to portions of the benchmark
|
|
||||||
applying to the running host.
|
|
||||||
|
|
||||||
The easiest way to run your hosts against the Docker Bench for Security is by
|
You can simply run this script from your base host by running:
|
||||||
running our pre-built container:
|
|
||||||
|
```sh
|
||||||
|
git clone https://github.com/docker/docker-bench-security.git
|
||||||
|
cd docker-bench-security
|
||||||
|
sudo sh docker-bench-security.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
### Run with Docker
|
||||||
|
|
||||||
|
We packaged docker bench as a small container for your convenience. Note that this container is being run with a *lot* of privilege -- sharing the host's filesystem, pid and network namespaces, due to portions of the benchmark applying to the running host.
|
||||||
|
|
||||||
|
The easiest way to run your hosts against the Docker Bench for Security is by running our pre-built container:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
docker run --rm --net host --pid host --userns host --cap-add audit_control \
|
docker run --rm --net host --pid host --userns host --cap-add audit_control \
|
||||||
|
@ -36,20 +42,7 @@ docker run --rm --net host --pid host --userns host --cap-add audit_control \
|
||||||
Don't forget to adjust the shared volumes according to your operating system.
|
Don't forget to adjust the shared volumes according to your operating system.
|
||||||
Some examples are:
|
Some examples are:
|
||||||
|
|
||||||
1. `Docker Desktop` on macOS doesn't have `/usr/lib/systemd` or the above Docker
|
1. On Ubuntu the `docker.service` and `docker.secret` files are located in
|
||||||
binaries.
|
|
||||||
|
|
||||||
```sh
|
|
||||||
docker run --rm --net host --pid host --userns host --cap-add audit_control \
|
|
||||||
-e DOCKER_CONTENT_TRUST=$DOCKER_CONTENT_TRUST \
|
|
||||||
-v /etc:/etc \
|
|
||||||
-v /var/lib:/var/lib:ro \
|
|
||||||
-v /var/run/docker.sock:/var/run/docker.sock:ro \
|
|
||||||
--label docker_bench_security \
|
|
||||||
docker/docker-bench-security
|
|
||||||
```
|
|
||||||
|
|
||||||
2. On Ubuntu the `docker.service` and `docker.secret` files are located in
|
|
||||||
`/lib/systemd/system` folder by default.
|
`/lib/systemd/system` folder by default.
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
|
@ -66,17 +59,24 @@ docker run --rm --net host --pid host --userns host --cap-add audit_control \
|
||||||
docker/docker-bench-security
|
docker/docker-bench-security
|
||||||
```
|
```
|
||||||
|
|
||||||
|
2. `Docker Desktop` on macOS doesn't have `/usr/lib/systemd` or the above Docker
|
||||||
|
binaries.
|
||||||
|
|
||||||
|
```sh
|
||||||
|
docker run --rm --net host --pid host --userns host --cap-add audit_control \
|
||||||
|
-e DOCKER_CONTENT_TRUST=$DOCKER_CONTENT_TRUST \
|
||||||
|
-v /etc:/etc \
|
||||||
|
-v /var/lib:/var/lib:ro \
|
||||||
|
-v /var/run/docker.sock:/var/run/docker.sock:ro \
|
||||||
|
--label docker_bench_security \
|
||||||
|
docker/docker-bench-security
|
||||||
|
```
|
||||||
|
|
||||||
|
### Note
|
||||||
|
|
||||||
Docker bench requires Docker 1.13.0 or later in order to run.
|
Docker bench requires Docker 1.13.0 or later in order to run.
|
||||||
|
|
||||||
Note that when distributions don't contain `auditctl`, the audit tests will
|
Note that when distributions don't contain `auditctl`, the audit tests will check `/etc/audit/audit.rules` to see if a rule is present instead.
|
||||||
check `/etc/audit/audit.rules` to see if a rule is present instead.
|
|
||||||
|
|
||||||
Distribution specific Dockerfiles that fix these issues are available in the
|
|
||||||
[distros directory](https://github.com/docker/docker-bench-security/tree/master/distros).
|
|
||||||
|
|
||||||
The [distribution specific Dockerfiles](https://github.com/docker/docker-bench-security/tree/master/distros)
|
|
||||||
may also help if the distribution you're using hasn't yet shipped Docker
|
|
||||||
version 1.13.0 or later.
|
|
||||||
|
|
||||||
### Docker Bench for Security options
|
### Docker Bench for Security options
|
||||||
|
|
||||||
|
@ -84,48 +84,40 @@ version 1.13.0 or later.
|
||||||
-b optional Do not print colors
|
-b optional Do not print colors
|
||||||
-h optional Print this help message
|
-h optional Print this help message
|
||||||
-l FILE optional Log output in FILE, inside container if run using docker
|
-l FILE optional Log output in FILE, inside container if run using docker
|
||||||
-c CHECK optional Comma delimited list of specific check(s)
|
-u USERS optional Comma delimited list of trusted docker user(s)
|
||||||
-e CHECK optional Comma delimited list of specific check(s) to exclude
|
-c CHECK optional Comma delimited list of specific check(s) id
|
||||||
|
-e CHECK optional Comma delimited list of specific check(s) id to exclude
|
||||||
-i INCLUDE optional Comma delimited list of patterns within a container or image name to check
|
-i INCLUDE optional Comma delimited list of patterns within a container or image name to check
|
||||||
-x EXCLUDE optional Comma delimited list of patterns within a container or image name to exclude from check
|
-x EXCLUDE optional Comma delimited list of patterns within a container or image name to exclude from check
|
||||||
-n LIMIT optional In JSON output, when reporting lists of items (containers, images, etc.), limit the number of reported items to LIMIT. Default 0 (no limit).
|
-n LIMIT optional In JSON output, when reporting lists of items (containers, images, etc.), limit the number of reported items to LIMIT. Default 0 (no limit).
|
||||||
|
-p PRINT optional Disable the printing of remediation measures. Default: print remediation measures.
|
||||||
```
|
```
|
||||||
|
|
||||||
By default the Docker Bench for Security script will run all available CIS tests
|
By default the Docker Bench for Security script will run all available CIS tests and produce
|
||||||
and produce logs in the log folder from current directory, named `docker-bench-security.sh.log.json`
|
logs in the log folder from current directory, named `docker-bench-security.sh.log.json` and
|
||||||
and `docker-bench-security.sh.log`.
|
`docker-bench-security.sh.log`.
|
||||||
|
|
||||||
If the docker container is used then the log files will be created inside the container. If you wish to access them from the host after the container has been run you will need to mount a volume for storing them in.
|
If the docker container is used then the log files will be created inside the container in location `/usr/local/bin/log/`. If you wish to access them from the host after the container has been run you will need to mount a volume for storing them in.
|
||||||
|
|
||||||
The CIS based checks are named `check_<section>_<number>`, e.g. `check_2_6`
|
The CIS based checks are named `check_<section>_<number>`, e.g. `check_2_6` and community contributed checks are named `check_c_<number>`. A complete list of checks is present in [TESTS.md](tests/TESTS.md).
|
||||||
and community contributed checks are named `check_c_<number>`.
|
|
||||||
A complete list of checks is present in [functions_lib.sh](functions_lib.sh).
|
|
||||||
|
|
||||||
`sh docker-bench-security.sh -l /tmp/docker-bench-security.sh.log -c check_2_2`
|
`sh docker-bench-security.sh -c check_2_2` will only run check `2.2 Ensure the logging level is set to 'info'`.
|
||||||
will only run check `2.2 Ensure the logging level is set to 'info'`.
|
|
||||||
|
|
||||||
`sh docker-bench-security.sh -l /tmp/docker-bench-security.sh.log -e check_2_2`
|
`sh docker-bench-security.sh -e check_2_2` will run all available checks except `2.2 Ensure the logging level is set to 'info'`.
|
||||||
will run all available checks except `2.2 Ensure the logging level is set to 'info'`.
|
|
||||||
|
|
||||||
`sh docker-bench-security.sh -l /tmp/docker-bench-security.sh.log -e docker_enterprise_configuration`
|
`sh docker-bench-security.sh -e docker_enterprise_configuration` will run all available checks except the docker_enterprise_configuration group
|
||||||
will run all available checks except the docker_enterprise_configuration group
|
|
||||||
|
|
||||||
`sh docker-bench-security.sh -l /tmp/docker-bench-security.sh.log -e docker_enterprise_configuration,check_2_2`
|
`sh docker-bench-security.sh -e docker_enterprise_configuration,check_2_2` will run allavailable checks except the docker_enterprise_configuration group and `2.2 Ensure the logging level is set to 'info'`
|
||||||
will run all available checks except the docker_enterprise_configuration group
|
|
||||||
and `2.2 Ensure the logging level is set to 'info'`
|
|
||||||
|
|
||||||
`sh docker-bench-security.sh -l /tmp/docker-bench-security.sh.log -c container_images -e check_4_5`
|
`sh docker-bench-security.sh -c container_images -e check_4_5` will run just the container_images checks except `4.5 Ensure Content trust for Docker is Enabled`
|
||||||
will run just the container_images checks except
|
|
||||||
`4.5 Ensure Content trust for Docker is Enabled`
|
|
||||||
|
|
||||||
Note that when submitting checks, provide information why it is a
|
Note that when submitting checks, provide information why it is a reasonable test to add and please include some kind of official documentation verifying that information.
|
||||||
reasonable test to add and please include some kind of official documentation
|
|
||||||
verifying that information.
|
|
||||||
|
|
||||||
## Building Docker Bench for Security
|
## Building Docker image
|
||||||
|
|
||||||
If you wish to build and run this container yourself, you can follow the
|
You have two options if you wish to build and run this container yourself:
|
||||||
following steps:
|
|
||||||
|
1. Use Docker Build:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
git clone https://github.com/docker/docker-bench-security.git
|
git clone https://github.com/docker/docker-bench-security.git
|
||||||
|
@ -133,8 +125,9 @@ cd docker-bench-security
|
||||||
docker build --no-cache -t docker-bench-security .
|
docker build --no-cache -t docker-bench-security .
|
||||||
```
|
```
|
||||||
|
|
||||||
followed by an appropriate `docker run` command as stated above
|
Followed by an appropriate `docker run` command as stated above.
|
||||||
or use [Docker Compose](https://docs.docker.com/compose/):
|
|
||||||
|
2. Use Docker Compose:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
git clone https://github.com/docker/docker-bench-security.git
|
git clone https://github.com/docker/docker-bench-security.git
|
||||||
|
@ -142,13 +135,4 @@ cd docker-bench-security
|
||||||
docker-compose run --rm docker-bench-security
|
docker-compose run --rm docker-bench-security
|
||||||
```
|
```
|
||||||
|
|
||||||
Also, this script can also be simply run from your base host by running:
|
This script was built to be POSIX 2004 compliant, so it should be portable across any Unix platform.
|
||||||
|
|
||||||
```sh
|
|
||||||
git clone https://github.com/docker/docker-bench-security.git
|
|
||||||
cd docker-bench-security
|
|
||||||
sudo sh docker-bench-security.sh
|
|
||||||
```
|
|
||||||
|
|
||||||
This script was built to be POSIX 2004 compliant, so it should be portable
|
|
||||||
across any Unix platform.
|
|
||||||
|
|
Loading…
Reference in a new issue