MD7X-00-002700 MongoDB software installation account must be restricted to authorized users.

Information

When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can have significant effects on the overall security of the system.

If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process.

Accordingly, only qualified and authorized individuals must be allowed access to information system components for purposes of initiating changes, including upgrades and modifications.

Database administrators (DBAs) and other privileged administrative or application owner accounts are granted privileges that allow actions that can have a great impact on database security and operation. It is especially important to grant privileged access to only those persons who are qualified and authorized to use them.

Solution

It is recommended to use the official installation packages provided by MongoDB. In the event the software was installed manually, and permissions need to be restricted, consider a clean reinstallation.

Alternatively, run the following commands to properly set permissions on the configuration file:

$ chown mongod <MongoDB configuration file>
$ chgrp mongod <MongoDB configuration file>
$ chmod 600 <<MongoDB configuration file>

The name and location for the MongoDB configuration file will vary according to local circumstances. The default name and location is /etc/mongod.conf.

Using the default name and location the commands would be:

$ chown mongod /etc/mongod.conf
$ chgrp mongod /etc/mongod.conf
$ chmod 600 /etc/mongod.conf

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MongoDB_Enterprise_Advanced_7-x_V1R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-5(6), CAT|I, CCI|CCI-001499, Rule-ID|SV-265911r1028721_rule, STIG-ID|MD7X-00-002700, Vuln-ID|V-265911

Plugin: Unix

Control ID: 232f1056557cbad620dd7da3be895facea788ba8893281251f7243dd16da0ae4