STIGQter STIGQter: STIG Summary: MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 24 Jul 2020:

The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be restricted to authorized users.

DISA Rule

SV-96571r1_rule

Vulnerability Number

V-81857

Group Title

SRG-APP-000133-DB-000362

Rule Version

MD3X-00-000270

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Use the following commands to remove unauthorized access to a MongoDB database.

db.revokePrivilegesFromRole()
db. revokeRolesFromUser()

MongoDB commands for role management can be found here:
https://docs.mongodb.com/v3.4/reference/method/js-role-management/

Check Contents

Run the following command to get the roles from a MongoDB database.

For each database in MongoDB:

use <database>
db.getRoles(
{
rolesInfo: 1,
showPrivileges:true,
showBuiltinRoles: true
}
)

Run the following command to the roles assigned to users:

use admin
db.system.users.find()

Analyze the output and if any roles or users have unauthorized access, this is a finding.

Vulnerability Number

V-81857

Documentable

False

Rule Version

MD3X-00-000270

Severity Override Guidance

Run the following command to get the roles from a MongoDB database.

For each database in MongoDB:

use <database>
db.getRoles(
{
rolesInfo: 1,
showPrivileges:true,
showBuiltinRoles: true
}
)

Run the following command to the roles assigned to users:

use admin
db.system.users.find()

Analyze the output and if any roles or users have unauthorized access, this is a finding.

Check Content Reference

M

Target Key

3265

Comments