2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanisms | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - CAFile | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthMode | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - clusterFile | CONFIGURATION MANAGEMENT |
2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFile | CONFIGURATION MANAGEMENT |
4.1 Ensure legacy TLS protocols are disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.4 Ensure Federal Information Processing Standard (FIPS) is enabled | SYSTEM AND COMMUNICATIONS PROTECTION |
4.5 Ensure Encryption of Data at Rest - enableEncryption | SYSTEM AND COMMUNICATIONS PROTECTION |
4.5 Ensure Encryption of Data at Rest - encryptionKeyFile | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2 Ensure that audit filters are configured properly | AUDIT AND ACCOUNTABILITY |
5.3 Ensure that logging captures as much information as possible | AUDIT AND ACCOUNTABILITY |
5.4 Ensure that new entries are appended to the end of the log file | AUDIT AND ACCOUNTABILITY |
6.2 Ensure that operating system resource limits are set for MongoDB | SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Ensure that server-side scripting is disabled if not needed | SYSTEM AND INFORMATION INTEGRITY |
CIS_MongoDB_6_Benchmark_Level_2_OS_Linux_v1.1.0.audit from CIS MongoDB 6 Benchmark | |