3.3 Ensure that MongoDB is run using a non-privileged, dedicated service account

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The MongoDB service should not be run using a privileged account such as 'root' because this unnecessarily exposes the operating system to high risk.

Rationale:

Using a non-privileged, dedicated service account restricts the database from accessing the critical areas of the operating system which are not required by the MongoDB. This will also mitigate the potential for unauthorized access via a compromised, privileged account on the operating system.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Create a dedicated user for performing MongoDB database activity.

Set the Database data files, the keyfile, and the SSL private key files to only be readable by the mongod/mongos user.

Set the log files to only be writable by the mongod/mongos user and readable only by root.

Default Value:

Not configured

See Also

https://workbench.cisecurity.org/files/3773