Skip to content

MongoDB Enterprise Advanced 4.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000133-DB-000199

    Group
  • Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.

    When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have signi...
    Rule Medium Severity
  • SRG-APP-000133-DB-000200

    Group
  • Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be owned by database/DBMS principals authorized for ownership.

    Within the database, object ownership implies full privileges to the owned object, including the privilege to assign access to the owned objects to other subjects. Database functions and procedures...
    Rule Medium Severity
  • SRG-APP-000133-DB-000362

    Group
  • SRG-APP-000141-DB-000091

    Group
  • SRG-APP-000148-DB-000103

    Group
  • MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    Group
  • SRG-APP-000171-DB-000074

    Group
  • If passwords are used for authentication, MongoDB must store only hashed, salted representations of passwords.

    The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and require...
    Rule High Severity
  • SRG-APP-000176-DB-000068

    Group
  • SRG-APP-000177-DB-000069

    Group
  • MongoDB must map the PKI-authenticated identity to an associated user account.

    The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be mapped to a DBMS user account for the authenticated identity to be meanin...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    Group
  • MongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction with the user for authentication will be handled by a software component se...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    Group
  • MongoDB must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    Group
  • MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers based on patterns in identifiers already known. The preferred technique fo...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    Group
  • SRG-APP-000243-DB-000128

    Group
  • Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.

    Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Data used for the development and testing of applications often involves c...
    Rule Medium Severity
  • SRG-APP-000251-DB-000160

    Group
  • SRG-APP-000266-DB-000162

    Group
  • SRG-APP-000267-DB-000163

    Group
  • MongoDB must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.

    If MongoDB provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully con...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    Group
  • MongoDB must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i.e., network disconnect). ...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    Group
  • MongoDB must utilize centralized management of the content captured in audit records generated by all components of MongoDB.

    Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and correlation of suspicious behavior would be difficult and could lead to a del...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    Group
  • SRG-APP-000359-DB-000319

    Group
  • MongoDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    Organizations are required to use a central log management system; so, under normal conditions, the audit space allocated to MongoDB on its own server will not be an issue. However, space will stil...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    Group
  • SRG-APP-000380-DB-000360

    Group
  • MongoDB must enforce access restrictions associated with changes to the configuration of MongoDB or database(s).

    Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the overall security of the system. When dealing with access restrictions pe...
    Rule Medium Severity
  • SRG-APP-000389-DB-000372

    Group
  • SRG-APP-000400-DB-000367

    Group
  • MongoDB must prohibit the use of cached authenticators after an organization-defined time period.

    If cached authentication information is out-of-date, the validity of the authentication information may be questionable.
    Rule Medium Severity
  • SRG-APP-000427-DB-000385

    Group
  • SRG-APP-000441-DB-000378

    Group
  • MongoDB must maintain the confidentiality and integrity of information during preparation for transmission.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including, for example, during aggregation, at protocol transformation points, an...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    Group
  • MongoDB must maintain the confidentiality and integrity of information during reception.

    Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/un...
    Rule Medium Severity
  • SRG-APP-000447-DB-000393

    Group
  • SRG-APP-000454-DB-000389

    Group
  • When updates are applied to MongoDB software, any software components that have been replaced or made unnecessary must be removed.

    Previous versions of DBMS components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some DBMSs' installation tools may remove o...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    Group
  • Security-relevant software updates to MongoDB must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantly updating and patching their products to address newly discovered secur...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules