1.1 Ensure the appropriate MongoDB software version/patches are installed | CONFIGURATION MANAGEMENT |
2.1 Ensure Authentication is configured | IDENTIFICATION AND AUTHENTICATION |
2.2 Ensure that MongoDB does not bypass authentication via the localhost exception | IDENTIFICATION AND AUTHENTICATION |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | ACCESS CONTROL |
4.2 Ensure Weak Protocols are Disabled | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption) | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.1 Ensure that system activity is audited | AUDIT AND ACCOUNTABILITY |
6.1 Ensure that MongoDB uses a non-default port | CONFIGURATION MANAGEMENT |
7.1 Ensure appropriate key file permissions are set | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.2 Ensure appropriate database file permissions are set. | ACCESS CONTROL, MEDIA PROTECTION |
CIS_MongoDB_7_v1.1.0_L1_OS_Windows.audit from CIS MongoDB 7 Benchmark v1.1.0 | |