MD4X-00-002950 - If passwords are used for authentication, MongoDB must implement LDAP or Kerberos for authentication to enforce the DoD standards for password complexity and lifetime.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native DBMS authentication may be used only when circumstances make it unavoidable, and must be documented and AO-approved.

The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval.

In such cases, the DoD standards for password complexity and lifetime must be implemented. DBMS products that can inherit the rules for these from the operating system or access control program (e.g., Microsoft Active Directory) must be configured to do so. For other DBMSs, the rules must be enforced using available configuration parameters or custom code.

For MongoDB, password complexity and lifetime requirements must be enforced by an external authentication source such as LDAP, Active Directory, or Kerberos.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Password complexity and lifetime must be enforced by an external authentication source such as LDAP, Active Directory, or Kerberos.

Information on configuring MongoDB for one of these authentication mechanisms be found here:

LDAP/Active Directory:
https://docs.mongodb.com/v4.4/tutorial/authenticate-nativeldap-activedirectory/

Kerberos:
https://docs.mongodb.com/v4.4/tutorial/control-access-to-mongodb-with-kerberos-authentication/

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MDB_Enterprise_Advanced_4-x_V1R2_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000192, Rule-ID|SV-252158r863321_rule, STIG-ID|MD4X-00-002950, Vuln-ID|V-252158

Plugin: Unix

Control ID: e63fb7204acbb1f4bcfae3c4742ca0eeca4621d38708c66a477b7b7df0936724