2.3 Ensure authentication is enabled in the sharded cluster | CONFIGURATION MANAGEMENT |
4.1 Ensure legacy TLS protocols are disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
4.4 Ensure Federal Information Processing Standard (FIPS) is enabled | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.5 Ensure Encryption of Data at Rest | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.2 Ensure that audit filters are configured properly | AUDIT AND ACCOUNTABILITY |
5.3 Ensure that logging captures as much information as possible | AUDIT AND ACCOUNTABILITY |
5.4 Ensure that new entries are appended to the end of the log file | AUDIT AND ACCOUNTABILITY |
6.2 Ensure that operating system resource limits are set for MongoDB | CONFIGURATION MANAGEMENT |
6.3 Ensure that server-side scripting is disabled if not needed | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
CIS_MongoDB_7_v1.1.0_L2_OS_Linux.audit from CIS MongoDB 7 Benchmark v1.1.0 | |