MD7X-00-000200 MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

Information

MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Edit the MongoDB configuration file (default location: /etc/mongod.conf) to include the following:

security:
authorization: "enabled"

This will enable SCRAM-SHA-256 authentication (default).

Instruction on configuring the default authentication is provided here:
https://www.mongodb.com/docs/v7.0/tutorial/enable-authentication/

The high-level steps described by the above will require the following:

1. Start MongoDB without access control.
2. Connect to the instance.
3. Create the user administrator.
4. Restart the MongoDB instance with access control.
5. Connect and authenticate as the user administrator.
6. Create additional users as needed for the deployment.

Configuration information for LDAP for MongoDB can be found here: https://www.mongodb.com/docs/v7.0/core/security-ldap-external/

https://www.mongodb.com/docs/v7.0/core/security-ldap-external/#configuration

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MongoDB_Enterprise_Advanced_7-x_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(1), CAT|I, CCI|CCI-000015, Rule-ID|SV-265905r1028704_rule, STIG-ID|MD7X-00-000200, Vuln-ID|V-265905

Plugin: Unix

Control ID: 31141048d65fde7eebb445504b462cd65730150629c9d535058660e8902e3b05