Challenge - 5 Problems
CIS Docker Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate1:30remaining
Check Docker daemon configuration for CIS compliance
You run the command
docker info --format '{{json .SecurityOptions}}' on a Docker host. What is the expected output if the host is compliant with CIS benchmark regarding security options?Docker
docker info --format '{{json .SecurityOptions}}'
Attempts:
2 left
💡 Hint
CIS recommends enabling multiple security options including seccomp, apparmor, and selinux where applicable.
✗ Incorrect
The CIS Docker benchmark requires that Docker daemon runs with security options like seccomp, apparmor, and selinux enabled to reduce attack surface.
🧠 Conceptual
intermediate1:00remaining
Understanding CIS Docker benchmark for container user privileges
According to CIS Docker benchmarks, which practice is recommended to reduce risk related to container user privileges?
Attempts:
2 left
💡 Hint
Running containers as root inside the container increases security risks.
✗ Incorrect
CIS Docker benchmarks recommend running containers as a non-root user to limit potential damage if the container is compromised.
❓ Troubleshoot
advanced1:30remaining
Troubleshoot Docker daemon logging configuration for CIS compliance
You configured Docker daemon with
--log-driver=json-file and --log-opt max-size=10m. After restarting Docker, logs are not rotating as expected. What is the most likely cause?Attempts:
2 left
💡 Hint
Log rotation requires both size limit and number of files to keep.
✗ Incorrect
CIS Docker benchmark requires log rotation to prevent disk exhaustion. Setting only max-size without max-file means no rotation occurs.
🔀 Workflow
advanced2:00remaining
Implementing CIS Docker benchmark for image vulnerability scanning
Which sequence of steps correctly implements a workflow to scan Docker images for vulnerabilities as recommended by CIS Docker benchmarks?
Attempts:
2 left
💡 Hint
Start with pulling the image, then scan, fix, and finally push.
✗ Incorrect
The correct workflow is to pull the image, scan it, fix vulnerabilities, then push the updated image.
✅ Best Practice
expert1:30remaining
Identify the best CIS Docker benchmark practice for container network security
Which of the following is the best CIS Docker benchmark practice to secure container networking?
Attempts:
2 left
💡 Hint
User-defined networks allow better control over container communication.
✗ Incorrect
CIS recommends using user-defined bridge networks to isolate containers and control traffic, improving security.