STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide

V-221180

CAT II (Medium)

MongoDB must prevent unauthorized and unintended information transfer via shared system resources.

Rule ID

SV-221180r961149_rule

STIG

MongoDB Enterprise Advanced 3.x Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001090

Discussion

The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse. Satisfies: SRG-APP-000243-DB-000373, SRG-APP-000243-DB-000374

Check Content

Verify the permissions for the following database files or directories:

MongoDB default configuration file: "/etc/mongod.conf"
MongoDB default data directory: "/var/lib/mongo"

If the owner and group are not both "mongod", this is a finding.

If the file permissions are more permissive than "755", this is a finding.

Fix Text

Correct the permission to the files and/or directories that are in violation.

MongoDB Configuration file (default location): 
chown mongod:mongod /etc/mongod.conf
chmod 755 /etc/mongod.conf

MongoDB data file directory (default location): 
chown -R mongod:mongod/var/lib/mongo
chmod -R 755/var/lib/mongo