MD7X-00-012400 MongoDB must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for standalone systems.

Information

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Off-loading is a common process in information systems with limited audit storage capacity.

The DBMS may write audit records to database tables, to files in the file system, to other kinds of local repository, or directly to a centralized log management system. Whatever the method used, it must be compatible with off-loading the records to the centralized system.

Solution

To specify auditLog, or a centralized system log (which is recommended), configure these in the mongod.conf configuration file:

auditLog:
destination: syslog

Refer to documentation for additional configuration: https://www.mongodb.com/docs/v7.0/core/auditing/

Allocate sufficient space to the storage volume hosting the file identified in the MongoDB configuration "auditLog.path" to support audit file peak demand.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MongoDB_Enterprise_Advanced_7-x_V1R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4(1), CAT|II, CCI|CCI-001851, Rule-ID|SV-265953r1028645_rule, STIG-ID|MD7X-00-012400, Vuln-ID|V-265953

Plugin: Unix

Control ID: 5d08668ad8909daa7ded5a6cf2ba3f13bd490b9874b32e38989ee69010cd4024