The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
Find a file
2016-05-17 14:08:31 +03:00
bats_tests/test_helper Implemented tests for CIS 3.x section 2016-05-17 14:06:25 +03:00
distros use debian default docker.io 2016-03-01 21:37:23 +01:00
test run tests with run_test.sh; automatically generates tests per each running container, if needed 2016-05-17 14:06:25 +03:00
tests fighting with bats 2016-05-17 14:05:30 +03:00
.dockerignore add .dockerignore 2015-05-30 12:59:22 +02:00
.gitignore First version of the CIS Docker Benchmark v1.0.0 2015-05-13 15:26:45 -07:00
.gitmodules Add bats-assert library 2016-05-17 14:05:30 +03:00
bats.Dockerfile fix/ignore non working xterm (due to /etc volume); download latest docker 2016-05-17 14:06:25 +03:00
benchmark_log.png update image 2016-04-30 23:09:27 +02:00
CONTRIBUTING.md mention 1.11 benchmark instead of 1.6 2016-04-30 22:31:08 +02:00
docker-bench-security.sh update yell to 1.11 as well 2016-04-30 23:03:18 +02:00
docker-compose.yml use compose to improve readability 2015-10-06 07:30:21 +02:00
Dockerfile update to v1.10.0 2016-02-05 20:56:25 +01:00
generate_tests.sh run tests with run_test.sh; automatically generates tests per each running container, if needed 2016-05-17 14:06:25 +03:00
helper_lib.sh fighting with bats 2016-05-17 14:05:30 +03:00
LICENSE.md Fix unpopulated copyright in license 2015-05-29 11:12:47 -07:00
MAINTAINERS Add MAINTAINERS file 2015-12-07 18:49:11 +01:00
output_lib.sh Double quote to prevent globbing and word splitting. 2015-05-31 12:26:37 +02:00
README.md update README.md file with info about running Bats tests 2016-05-17 14:08:31 +03:00
run_tests.sh fix/ignore non working xterm (due to /etc volume); download latest docker 2016-05-17 14:06:25 +03:00

Docker Bench for Security

Docker Bench for Security running

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are inspired by the CIS Docker 1.11 Benchmark. We are releasing this as a follow-up to our Understanding Docker Security and Best Practices blog post.

We are making this available as an open-source utility so the Docker community can have an easy way to self-assess their hosts and docker containers against this benchmark.

Running Docker Bench for Security

We packaged docker bench as a small container for your convenience. Note that this container is being run with a lot of privilege -- sharing the host's filesystem, pid and network namespaces, due to portions of the benchmark applying to the running host.

The easiest way to run your hosts against the Docker Bench for Security is by running our pre-built container:

docker run -it --net host --pid host --cap-add audit_control \
    -v /var/lib:/var/lib \
    -v /var/run/docker.sock:/var/run/docker.sock \
    -v /usr/lib/systemd:/usr/lib/systemd \
    -v /etc:/etc --label docker_bench_security \
    docker/docker-bench-security

Docker bench requires Docker 1.10.0 or later in order to run.

Also note that the default image and Dockerfile uses FROM: alpine which doesn't contain auditctl, this will generate errors in section 1.8 to 1.18. Distribution specific Dockerfiles that fixes this issue are available in the distros directory.

The distribution specific Dockerfiles may also help if the distribution you're using haven't yet shipped Docker version 1.10.0 or later.

Running Docker Bench Bats tests

Bats is a TAP-compliant testing framework for Bash. It provides a simple way to verify that the UNIX programs you write behave as expected.

All Docker Bench scipts are also available as Bats tests. Also container level (and image level) tests are automatically generated for all containers avaiable on host. It's possible to run all or only selected test(s), if you like.

By default TAP test results are reported, but it's possible to produce a "pretty" printed output too.

Use the following command to run Docker Bench Bats tests:

Help documentation for run_tests.sh

Basic usage: run_tests.sh [-c] [-p|-t] [-o path] <test> [<test> ...]

Command line switches are optional. The following switches are recognized.
-c  --Displays number of tests. No further functions are performed.
-g  --Generates all CIS Bats tests without execution. No further functions are performed.
-p  --Show results in pretty format.
-t  --Show results in TAP format. This is the default format.
-t  --Create test results files: tests_<timestamp>.tap in test result folder.
-o  --Specify test result folder. Default to /var/docker-bench/results.
-h  --Displays this help message. No further functions are performed.

Example: run_tests.sh -t -o /var/docker-bench/results

You need to run run_tests.sh on Docker host as root user.

Running Docker Bench Bats tests from Docker image

First, clone and compile your docker-bench-tests Docker image.

git clone https://github.com/gaia-adm/docker-bench-security.git
cd docker-bench-security
docker build -t docker-bench-tests -f bats.Dockerfile .

Then run docker-bench-tests container (as bellow). Test results will be saved into /var/docker-bench folder in TAP format. Test results file is named accoring to the test_<timestamp>.tap pattern.

docker run -it --net host --pid host --cap-add audit_control \
    -v /var/lib:/var/lib \
    -v /var/run/docker.sock:/var/run/docker.sock \
    -v /usr/lib/systemd:/usr/lib/systemd \
    -v /var/docker-bench:/var/docker-bench
    -v /etc:/etc --label docker_bench_security \
    docker-bench-tests

update README.md file with info about running Bats tests

Building Docker Bench for Security

If you wish to build and run this container yourself, you can follow the following steps:

git clone https://github.com/docker/docker-bench-security.git
cd docker-bench-security
docker build -t docker-bench-security .
docker run -it --net host --pid host --cap-add audit_control \
    -v /var/lib:/var/lib \
    -v /var/run/docker.sock:/var/run/docker.sock \
    -v /usr/lib/systemd:/usr/lib/systemd \
    -v /etc:/etc --label docker_bench_security \
    docker-bench-security

or use Docker Compose:

git clone https://github.com/docker/docker-bench-security.git
cd docker-bench-security
docker-compose run --rm docker-bench-security

Also, this script can also be simply run from your base host by running:

git clone https://github.com/docker/docker-bench-security.git
cd docker-bench-security
sh docker-bench-security.sh

This script was build to be POSIX 2004 compliant, so it should be portable across any Unix platform.