I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000266-DB-000162
<GroupDescription></GroupDescription>Group -
MongoDB must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromis...Rule Medium Severity -
SRG-APP-000267-DB-000163
<GroupDescription></GroupDescription>Group -
MongoDB must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.
<VulnDiscussion>If MongoDB provides too much information in error logs and administrative messages to the screen, this could lead to compromi...Rule Medium Severity -
SRG-APP-000311-DB-000308
<GroupDescription></GroupDescription>Group -
MongoDB must associate organization-defined types of security labels having organization-defined security label values with information in storage.
<VulnDiscussion>Without the association of security labels to information, there is no basis for MongoDB to make security-related access-cont...Rule Medium Severity -
SRG-APP-000328-DB-000301
<GroupDescription></GroupDescription>Group -
MongoDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-APP-000356-DB-000314
<GroupDescription></GroupDescription>Group -
MongoDB must utilize centralized management of the content captured in audit records generated by all components of MongoDB.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
MongoDB must allocate audit record storage capacity in accordance with site audit record storage requirements.
<VulnDiscussion>In order to ensure sufficient storage capacity for the audit logs, MongoDB must be able to allocate audit record storage capa...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
MongoDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75% of maximum audit record storage capacity.
<VulnDiscussion>Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to ...Rule Medium Severity -
SRG-APP-000378-DB-000365
<GroupDescription></GroupDescription>Group -
MongoDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...Rule Medium Severity -
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
MongoDB must enforce access restrictions associated with changes to the configuration of MongoDB or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000389-DB-000372
<GroupDescription></GroupDescription>Group -
MongoDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
<VulnDiscussion>The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...Rule Medium Severity -
SRG-APP-000400-DB-000367
<GroupDescription></GroupDescription>Group -
MongoDB must prohibit the use of cached authenticators after an organization-defined time period.
<VulnDiscussion>If cached authentication information is out-of-date, the validity of the authentication information may be questionable.</...Rule Medium Severity -
SRG-APP-000427-DB-000385
<GroupDescription></GroupDescription>Group -
MongoDB must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.
<VulnDiscussion>Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedure...Rule Medium Severity -
SRG-APP-000428-DB-000386
<GroupDescription></GroupDescription>Group -
MongoDB must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
<VulnDiscussion>DBMSs handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclos...Rule Medium Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
MongoDB must maintain the confidentiality and integrity of information during preparation for transmission.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...Rule Medium Severity -
SRG-APP-000442-DB-000379
<GroupDescription></GroupDescription>Group -
MongoDB must maintain the confidentiality and integrity of information during reception.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...Rule Medium Severity -
SRG-APP-000447-DB-000393
<GroupDescription></GroupDescription>Group -
When invalid inputs are received, MongoDB must behave in a predictable and documented manner that reflects organizational and system objectives.
<VulnDiscussion>A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...Rule Medium Severity -
SRG-APP-000178-DB-000083
<GroupDescription></GroupDescription>Group -
MongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
<VulnDiscussion>The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction wit...Rule High Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.
<VulnDiscussion>Configuring MongoDB to implement organization-wide security implementation guides and security checklists ensures compliance ...Rule Medium Severity -
SRG-APP-000456-DB-000400
<GroupDescription></GroupDescription>Group -
MongoDB products must be a version supported by the vendor.
<VulnDiscussion>Unsupported commercial and database systems should not be used because fixes to newly identified bugs will not be implemented...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.