Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-221180 | MD3X-00-000470 | SV-221180r879649_rule | Medium |
Description |
---|
The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse. Satisfies: SRG-APP-000243-DB-000373, SRG-APP-000243-DB-000374 |
STIG | Date |
---|---|
MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide | 2024-01-24 |
Check Text ( C-22895r411034_chk ) |
---|
Verify the permissions for the following database files or directories: MongoDB default configuration file: "/etc/mongod.conf" MongoDB default data directory: "/var/lib/mongo" If the owner and group are not both "mongod", this is a finding. If the file permissions are more permissive than "755", this is a finding. |
Fix Text (F-22884r411035_fix) |
---|
Correct the permission to the files and/or directories that are in violation. MongoDB Configuration file (default location): chown mongod:mongod /etc/mongod.conf chmod 755 /etc/mongod.conf MongoDB data file directory (default location): chown -R mongod:mongod/var/lib/mongo chmod -R 755/var/lib/mongo |