MD4X-00-001600 - MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals. - authorization

Information

MongoDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

Solution

Edit the %MongoDB configuration file% (default location: /etc/mongod.conf) to include the following:

security:
authorization: enabled

This will enable SCRAM-SHA-256 authentication (default).

Instruction on configuring the default authentication is provided here: https://docs.mongodb.com/v4.4/tutorial/enable-authentication/

The high-level steps described by the above will require the following:

1. Start MongoDB without access control.
2. Connect to the instance.
3. Create the user administrator.
4. Restart the MongoDB instance with access control.
5. Connect and authenticate as the user administrator.
6. Create additional users as needed for deployment.

Configuration information for LDAP for MongoDB can be found here: https://docs.mongodb.com/v4.4/core/security-ldap-external/
https://docs.mongodb.com/v4.4/core/security-ldap-external/#configuration

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MDB_Enterprise_Advanced_4-x_V1R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(1), CAT|II, CCI|CCI-000015, Rule-ID|SV-252149r813829_rule, STIG-ID|MD4X-00-001600, Vuln-ID|V-252149

Plugin: Unix

Control ID: 9e8d462685cab84e515e584f97470f37a91185f21debc39fdb0f4b5e006ba471