2.1 Ensure Authentication is configured | IDENTIFICATION AND AUTHENTICATION |
2.2 Ensure that MongoDB does not bypass authentication via the localhost exception | IDENTIFICATION AND AUTHENTICATION |
3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account | ACCESS CONTROL |
4.2 Ensure Weak Protocols are Disabled | SYSTEM AND COMMUNICATIONS PROTECTION |
4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption) | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1 Ensure that system activity is audited | AUDIT AND ACCOUNTABILITY |
6.1 Ensure that MongoDB uses a non-default port | SYSTEM AND INFORMATION INTEGRITY |
7.1 Ensure appropriate key file permissions are set - CAFile | IDENTIFICATION AND AUTHENTICATION |
7.1 Ensure appropriate key file permissions are set - keyFile | IDENTIFICATION AND AUTHENTICATION |
7.1 Ensure appropriate key file permissions are set - PEMKeyFile | IDENTIFICATION AND AUTHENTICATION |
7.2 Ensure appropriate database file permissions are set | ACCESS CONTROL |
CIS_mongodb_5_Benchmark_Level_1_OS_Linux_v1.2.0.audit from CIS MongoDB 5 Benchmark | |