2.4 Ensure an industry standard authentication mechanism is used - authenticationMechanisms | CONFIGURATION MANAGEMENT |
2.4 Ensure an industry standard authentication mechanism is used - authorization | IDENTIFICATION AND AUTHENTICATION |
2.4 Ensure an industry standard authentication mechanism is used - clusterAuthMode | IDENTIFICATION AND AUTHENTICATION |
2.4 Ensure an industry standard authentication mechanism is used - mode | SYSTEM AND COMMUNICATIONS PROTECTION |
5.3 Ensure that logging captures as much information as possible | AUDIT AND ACCOUNTABILITY |
5.4 Ensure that new entries are appended to the end of the log file | AUDIT AND ACCOUNTABILITY |
6.3 Ensure that operating system resource limits are set for MongoDB | SYSTEM AND COMMUNICATIONS PROTECTION |
6.4 Ensure that server-side scripting is disabled if not needed | CONFIGURATION MANAGEMENT |
6.5 Ensure that the HTTP interface is disabled | CONFIGURATION MANAGEMENT |
6.6 Ensure that JSONP access via an HTTP interface is disabled | CONFIGURATION MANAGEMENT |
6.7 Ensure that the REST API is disabled | CONFIGURATION MANAGEMENT |
CIS_MongoDB_Benchmark_Level_2_OS_Unix_v1.0.0.audit from CIS MongoDB Benchmark v1.0.0 | |