UCF STIG Viewer Logo

MongoDB must prevent unauthorized and unintended information transfer via shared system resources.


Overview

Finding ID Version Rule ID IA Controls Severity
V-221180 MD3X-00-000470 SV-221180r879649_rule Medium
Description
The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse. Satisfies: SRG-APP-000243-DB-000373, SRG-APP-000243-DB-000374
STIG Date
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide 2024-01-24

Details

Check Text ( C-22895r411034_chk )
Verify the permissions for the following database files or directories:

MongoDB default configuration file: "/etc/mongod.conf"
MongoDB default data directory: "/var/lib/mongo"

If the owner and group are not both "mongod", this is a finding.

If the file permissions are more permissive than "755", this is a finding.
Fix Text (F-22884r411035_fix)
Correct the permission to the files and/or directories that are in violation.

MongoDB Configuration file (default location):
chown mongod:mongod /etc/mongod.conf
chmod 755 /etc/mongod.conf

MongoDB data file directory (default location):
chown -R mongod:mongod/var/lib/mongo
chmod -R 755/var/lib/mongo