| 2.3 Ensure authentication is enabled in the sharded cluster | CONFIGURATION MANAGEMENT |
| 4.1 Ensure legacy TLS protocols are disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
| 4.4 Ensure Federal Information Processing Standard (FIPS) is enabled | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 4.5 Ensure Encryption of Data at Rest | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 5.2 Ensure that audit filters are configured properly | AUDIT AND ACCOUNTABILITY |
| 5.3 Ensure that logging captures as much information as possible | AUDIT AND ACCOUNTABILITY |
| 5.4 Ensure that new entries are appended to the end of the log file | AUDIT AND ACCOUNTABILITY |
| 6.2 Ensure that operating system resource limits are set for MongoDB | CONFIGURATION MANAGEMENT |
| 6.3 Ensure that server-side scripting is disabled if not needed | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
| CIS_MongoDB_7_v1.2.0_L2_Unix.audit from CIS MongoDB 7 Benchmark v1.2.0 | |