Page | 21
www.hackingarticles.in
The output results as
Info
,
Warning
,
Pass
and
Notes
for each of the configuration recommendations
as mention below:
1.
Host Configuration
2.
Docker Daemon Configuration
3.
Docker Daemon Configuration Files
4.
Container Images
and Build Files
5.
Container Runtime
6.
Docker Security Operations
Let me explain this in a better way: You can observe in the highlighted session that it has created alert
against root privilege for running the docker image.
Page | 22
www.hackingarticles.in
To fix
such type of misconfiguration, stop the running process
for docker and then again,
run the
docker image with low privilege user access as shown below.
If the loophole is closed, use the bench again for cross-validation and this time ensure you have passed
the warning. As you can see, this time we got the Green sign that shows we got the loopholes patched.