I'm wanting my website to use MongoDB as it's datastore. I've used MongoDB in my development environment with no worries, but I'm worried about security with a public server.
My server is a VPS running Arch Linux. The web application will also be running on it, so it only needs to accept connections from localhost. And no other users(by ssh or otherwise) will have direct access to my server.
What should I do to secure my instance of MongoDB?
Here is a good checklist
Enable auth – Even if you have deployed your Mongodb servers in a trusted network it is good security practice to enable auth. It provides you “Defense in depth” if your network is compromised. Edit your mongod configuration file to enable auth
Don’t expose your production db to the internet – Restricting physical access to your database is an important aspect of security. If it is not necessary do not expose your production database to the internet. In case of any compromise if an attacker cannot physically connect to your MongoDB server, your data is that much more secure. If you are on AWS you can place your db’s in a VPC private subnet. Read the blog post Deploying MongoDB in a VPC for more information.
Use firewalls – Use firewalls to restrict which other entities are allowed to connect to your mongodb server. Best practice is to only allow your application servers access to the database. If you are hosted on AWS use ‘Security groups’ to restrict access. If you are hosted on a provider that does not support firewall constructs you can easily configure it yourself using ‘iptables’. Refer to the mongodb documentation to configure iptables for your scenario.
Use key files to setup the replica set – Specify a shared key file to enable communication between your mongodb instances in a replica set. To enable this add the keyfile parameter to the config file as below. The contents of the file need to be the same on all the machines.
Disable HTTP status interface Mongodb by default provides a http interface running by default on port 28017 which provides the “home” status page. This interface is not recommended for production use and is best disabled. Use the “nohttpinterface” configuration setting to disable the http interface.
Disable the REST interface The monogdb REST interface is not recommended for production. It does not support any authentication. It is turned off by default. If you have turned it on using the “rest” configuration option you should turn it off for production systems.
Configure Bind_ip If your system has multiple network interfaces you can use the “bind_ip” option to restrict your mongodb server to listen only on the interfaces that are relevant. By default mongodb will bind to all the interfaces
Enable SSL – If you don’t use SSL your data is traveling between your Mongo client and Mongo server unencrypted and is susceptible to eavesdropping, tampering and “man in the middle” attacks. This is especially important if you are connecting to your Mongodb server over unsecure networks like the internet.
Role based authorization – MongoDB supports role based authentication to give you fine grained control over the actions that can be performed by each user. Use role based constructs to restrict access instead of making all your users admins. Refer to the roles documentation for more details.
Enterprise mongodb & Kerberos Enterprise mongodb integrates with Kerberos for authentication. Refer to the mongodb documentation for more details. Username/password systems are inherently insecure – use kerb based authentication if possible.
https://scalegrid.io/blog/10-tips-to-improve-your-mongodb-security/
Disclaimer: I am the founder of scalegrid.io
Security and Authentication MongoDB documentation.
Mongo supports only very basic security:
same query has been well discussed here ~ https://security.stackexchange.com/questions/7610/how-to-secure-a-mongodb-instance/7655#7655
Few very initial things to remember are:
actually they are applicable on all DataStorage Services
PS: very limited mongodb experience
For security, it is better to prevent any external access to the MongoDB node. You could run the app and MongoDB on different nodes. The app node is accessible from outside, while, the MongoDB node only opens the MongoDB port to the app node.
Also follow the MongoDB official security checklist to protect MongoDB.
FireCamp automates it for you on Cloud, such as AWS. FireCamp enforces security. 1) The AppAccessSecurityGroup is the only one allowed to access MongoDB. Please create your application node on the AppAccessSecurityGroup, and the VPC that MongoDB node runs on. 2) A Bastion node is created and is the only one that could SSH to the MongoDB nodes. 3) MongoDB user authentication and access control between members of a ReplicaSet are enabled.