STIGQter STIGQter: STIG Summary: MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 24 Jul 2020:

MongoDB must maintain the confidentiality and integrity of information during preparation for transmission.

DISA Rule

SV-96635r1_rule

Vulnerability Number

V-81921

Group Title

SRG-APP-000441-DB-000378

Rule Version

MD3X-00-000760

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Stop the MongoDB instance if it is running. Obtain a certificate from a valid DoD certificate authority to be used for encrypted data transmission. Modify the MongoDB configuration file with ssl configuration options such as:

net:
ssl:
mode: requireSSL
PEMKeyFile: /etc/ssl/mongodb.pem

Set "net.ssl.mode" to the "requireSSL".
Set "net.ssl.KeyFile" to the full path of the certificate (.pem) file.

Start/stop (restart) all mongod or mongos instances using the MongoDB configuration file (default location: /etc/mongod.conf).

Check Contents

Review the system information/specification for information indicating a strict requirement for data integrity and confidentiality when data is being prepared to be transmitted.

If such information is absent therein, this is not a finding.

If such information is present, inspect the MongoDB configuration file (default location: /etc/mongod.conf) for the following entries:

net:
ssl:
mode: requireSSL
PEMKeyFile: /etc/ssl/mongodb.pem

If net.ssl.mode is not set to "requireSSL", this is a finding.

Vulnerability Number

V-81921

Documentable

False

Rule Version

MD3X-00-000760

Severity Override Guidance

Review the system information/specification for information indicating a strict requirement for data integrity and confidentiality when data is being prepared to be transmitted.

If such information is absent therein, this is not a finding.

If such information is present, inspect the MongoDB configuration file (default location: /etc/mongod.conf) for the following entries:

net:
ssl:
mode: requireSSL
PEMKeyFile: /etc/ssl/mongodb.pem

If net.ssl.mode is not set to "requireSSL", this is a finding.

Check Content Reference

M

Target Key

3265

Comments