- Securing MongoDB overview
- Securing MongoDB step by step
- Locking down the network
- Evolution of native auth in MongoDB
- Native Auth in MongoDB 2.6
- Authentication in sharded clusters: Databases
- Authentication in sharded clusters: Collections
- Authentication in sharded clusters: Users
- Authorization: Concepts
- Authorization: Roles
- Authorization: Demo
- Using SSL with MongoDB
- Using SSL with MongoDB 2.6
- SSL with MongoDB demo
- SSL with MongoDB caveats
Which of the following are recommended best practices for MongoDB deployments? Check all that apply.
- Don't limit the source IP addresses for incoming connections
+ Use role-based access control
+ Encrypt all communication with TLS/SSL
In mongoDB, which of the following are true of SSL (when SSL is required across the entire cluster, through the "requireSSL" mode)? Check all that apply:
+ SSL encrypts all communication between mongodb servers
+ SSL compresses data communicated between servers
+ SSL helps to prevent man-in-the-middle attacks