MD4X-00-000900 - MongoDB must prevent unauthorized and unintended information transfer via shared system resources - .conf file

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse.

Satisfies: SRG-APP-000243-DB-000373, SRG-APP-000243-DB-000374

Solution

Correct the permission to the files and/or directories that are in violation.

%MongoDB configuration file% (default location /etc/mongod.conf):

chown mongod:mongod /etc/mongod.conf
chmod 600 /etc/mongod.conf

MongoDB datafiles and directories (default location /var/lib/mongo):

chown -R mongod:mongod /var/lib/mongo
chmod 755 /var/lib/mongo

find /var/lib/mongo/* -type f | xargs chmod 600
find /var/lib/mongo/* -type d | xargs chmod 700

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MDB_Enterprise_Advanced_4-x_V1R2_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001090, Rule-ID|SV-252142r817009_rule, STIG-ID|MD4X-00-000900, Vuln-ID|V-252142

Plugin: Unix

Control ID: d0d52f02f136ef20d5e88ee3945a92b1032fe97865182e8a58b2a2ea325d0304