Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000171-DB-000074

    <GroupDescription></GroupDescription>
    Group
  • If passwords are used for authentication, MongoDB must store only hashed, salted representations of passwords.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be us...
    Rule High Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must enforce authorized access to all PKI private keys stored/utilized by MongoDB.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. PKI certificate-based authentication is performed by re...
    Rule High Severity
  • SRG-APP-000177-DB-000069

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must map the PKI-authenticated identity to an associated user account.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Once a PKI certificate has been validated, it must be m...
    Rule Medium Severity
  • SRG-APP-000178-DB-000083

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

    &lt;VulnDiscussion&gt;The DoD standard for authentication is DoD-approved PKI certificates. Normally, with PKI authentication, the interaction wit...
    Rule High Severity
  • SRG-APP-000180-DB-000115

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Non-organizational users include all information system users other than organizational users, which include organizational e...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    &lt;VulnDiscussion&gt;One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers bas...
    Rule Medium Severity
  • SRG-APP-000231-DB-000154

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must protect the confidentiality and integrity of all information at rest.

    &lt;VulnDiscussion&gt;This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers...
    Rule High Severity
  • SRG-APP-000243-DB-000128

    <GroupDescription></GroupDescription>
    Group
  • Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.

    &lt;VulnDiscussion&gt;Applications, including DBMSs, must prevent unauthorized and unintended information transfer via shared system resources. Da...
    Rule Medium Severity
  • SRG-APP-000251-DB-000160

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must check the validity of all data inputs except those specifically identified by the organization.

    &lt;VulnDiscussion&gt;Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...
    Rule Medium Severity
  • SRG-APP-000266-DB-000162

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must provide non-privileged users with error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any DBMS or associated application providing too much information in error messages on the screen or printout risks compromis...
    Rule Medium Severity
  • SRG-APP-000267-DB-000163

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must reveal detailed error messages only to the ISSO, ISSM, SA, and DBA.

    &lt;VulnDiscussion&gt;If MongoDB provides too much information in error logs and administrative messages to the screen, this could lead to compromi...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must automatically terminate a user session after organization-defined conditions or trigger events requiring session disconnect.

    &lt;VulnDiscussion&gt;This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
    Rule Medium Severity
  • SRG-APP-000356-DB-000314

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must utilize centralized management of the content captured in audit records generated by all components of MongoDB.

    &lt;VulnDiscussion&gt;Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...
    Rule Medium Severity
  • SRG-APP-000357-DB-000316

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must allocate audit record storage capacity in accordance with site audit record storage requirements.

    &lt;VulnDiscussion&gt;In order to ensure sufficient storage capacity for the audit logs, MongoDB must be able to allocate audit record storage capa...
    Rule Medium Severity
  • SRG-APP-000359-DB-000319

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;Organizations are required to use a central log management system; so, under normal conditions, the audit space allocated to ...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...
    Rule Medium Severity
  • SRG-APP-000380-DB-000360

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must enforce access restrictions associated with changes to the configuration of MongoDB or database(s).

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...
    Rule Medium Severity
  • SRG-APP-000389-DB-000372

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.

    &lt;VulnDiscussion&gt;The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...
    Rule Medium Severity
  • SRG-APP-000400-DB-000367

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If cached authentication information is out-of-date, the validity of the authentication information may be questionable.&lt;/...
    Rule Medium Severity
  • SRG-APP-000427-DB-000385

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.

    &lt;VulnDiscussion&gt;Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedure...
    Rule Medium Severity
  • SRG-APP-000441-DB-000378

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must maintain the confidentiality and integrity of information during preparation for transmission.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...
    Rule Medium Severity
  • SRG-APP-000442-DB-000379

    <GroupDescription></GroupDescription>
    Group
  • MongoDB must maintain the confidentiality and integrity of information during reception.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, duri...
    Rule Medium Severity
  • SRG-APP-000447-DB-000393

    <GroupDescription></GroupDescription>
    Group
  • When invalid inputs are received, MongoDB must behave in a predictable and documented manner that reflects organizational and system objectives.

    &lt;VulnDiscussion&gt;A common vulnerability is unplanned behavior when invalid inputs are received. This requirement guards against adverse or uni...
    Rule Medium Severity
  • SRG-APP-000454-DB-000389

    <GroupDescription></GroupDescription>
    Group
  • When updates are applied to MongoDB software, any software components that have been replaced or made unnecessary must be removed.

    &lt;VulnDiscussion&gt;Previous versions of DBMS components that are not removed from the information system after updates have been installed may b...
    Rule Medium Severity
  • SRG-APP-000456-DB-000390

    <GroupDescription></GroupDescription>
    Group
  • Security-relevant software updates to MongoDB must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications, including database management systems, are discovered daily. Vendors are constantl...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules