MD3X-00-000590 - MongoDB must provide the means for individuals in authorized roles to change the auditing to be performed on all application components, based on all selectable event criteria within organization-defined time thresholds.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important forensic information may be lost.

This requirement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real time, within minutes, or within hours.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Use the rolling maintenance procedure.

For each member of a replica set, starting with a secondary member, perform the following sequence of events, ending with the primary:

1. Restart the mongod instance as a standalone.
2. Perform the configure auditing task on the standalone instance.
3. Restart the mongod instance as a member of the replica set.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MDB_Enterprise_Advanced_3-x_V1R2_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001914, Rule-ID|SV-96615r1_rule, STIG-ID|MD3X-00-000590, Vuln-ID|V-81901

Plugin: Unix

Control ID: 5e8b160452de45260cf899e881eb30bbbb48b071ad3022c47d490ac4fda2b7e1