SV-96589r1_rule
V-81875
SRG-APP-000179-DB-000114
MD3X-00-000380
CAT I
10
Enable FIPS 140-2 mode for MongoDB Enterprise.
Edit the MongoDB database configuration file (default location: /etc/mongod.conf) to contain the following parameter setting:
net:
ssl:
FIPSMode: true
Stop/start (restart) the mongod or mongos instance using this configuration.
For the operating system finding, please refer to the appropriate operating system documentation for the procedure to install, configure, and test FIPS mode.
If MongoDB is deployed in a classified environment:
In the MongoDB database configuration file (default location: /etc/mongod.conf), search for and review the following parameters:
net:
ssl:
FIPSMode: true
If this parameter is not present in the configuration file, this is a finding.
If "FIPSMode" is set to "false", this is a finding.
Check the server log file for a message that FIPS is active:
Search the log for the following text ""FIPS 140-2 mode activated"".
If this text is not found, this is a finding.
Verify that FIPS has been enabled at the operating system. The following will return "1" if FIPS is enabled:
cat /proc/sys/crypto/fips_enabled
If the above command does not return "1", this is a finding.
V-81875
False
MD3X-00-000380
If MongoDB is deployed in a classified environment:
In the MongoDB database configuration file (default location: /etc/mongod.conf), search for and review the following parameters:
net:
ssl:
FIPSMode: true
If this parameter is not present in the configuration file, this is a finding.
If "FIPSMode" is set to "false", this is a finding.
Check the server log file for a message that FIPS is active:
Search the log for the following text ""FIPS 140-2 mode activated"".
If this text is not found, this is a finding.
Verify that FIPS has been enabled at the operating system. The following will return "1" if FIPS is enabled:
cat /proc/sys/crypto/fips_enabled
If the above command does not return "1", this is a finding.
M
3265