Check: MD3X-00-000730
MongoDB Enterprise Advanced 3.x STIG:
MD3X-00-000730
(in versions v2 r3 through v1 r1)
Title
MongoDB must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions. (Cat II impact)
Discussion
Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. This requirement focuses on communications protection for MongoDB session rather than for the network packet.
Check Content
To run MongoDB in SSL mode, you have to obtain a valid certificate singed by a single certificate authority. Before starting the MongoDB database in SSL mode, verify that certificate used is issued by a valid DoD certificate authority (openssl x509 -in <path_to_certificate_pem_file> -text | grep -i "issuer"). If there is any issuer present in the certificate that is not a DoD approved certificate authority, this is a finding.
Fix Text
Remove any certificate that was not issued by an approved DoD certificate authority. Contact the organization's certificate issuer and request a new certificate that is issued by a valid DoD certificate authorities.
Additional Identifiers
Rule ID: SV-221195r961596_rule
Vulnerability ID: V-221195
Group Title: SRG-APP-000427-DB-000385
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002470 |
Only allow the use of organization-defined certificate authorities for verification of the establishment of protected sessions. |
Controls
Number | Title |
---|---|
SC-23(5) |
Allowed Certificate Authorities |