Sensitive host system directories such as below should not be allowed to be mounted as container volumes especially in read-write mode.
C:Program Files (x86)
If sensitive directories are mounted in read-write mode, it would be possible to make changes to files within those sensitive directories. The changes might bring down security implications or unwarranted changes that could put the Docker host in compromised state.
Docker defaults to a read-write volume but the user can also mount a directory read-only. By default, no sensitive host directories are mounted on containers.
This fix only applies to the use of Docker Engine - Enterprise.
Do not mount host sensitive directories on containers especially in read-write mode.
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Unix.