Workload misconfigurations

Ensure TLS authentication for Docker daemon is configured (Automated)

Compliance Frameworks
  • Docker CIS V1.3.1
  • ,
  • New Zealand Information Security Manual
  • ,
  • NIST 800-190


It is possible to make the Docker daemon available remotely over a TCP port. If this is required, you should ensure that TLS authentication is configured in order to restrict access to the Docker daemon via IP address and port.