This version of the documentation is archived and no longer supported.


This section outlines basic security and risk management strategies and access control. The included tutorials outline specific tasks for configuring firewalls, authentication, and system privileges.

You can download this section in PDF form as MongoDB Security.

Security Introduction
A high-level introduction to security and MongoDB deployments.
Security Concepts

The core documentation of security.

Mechanisms for verifying user and instance access to MongoDB.
Control access to MongoDB instances using authorization.
Network Exposure and Security
Discusses potential security risks related to the network and strategies for decreasing possible network-based attack vectors for MongoDB.

Continue reading from Security Concepts for additional documentation of MongoDB’s security features and operation.

Security Tutorials

Tutorials for enabling and configuring security features for MongoDB.

Network Security Tutorials
Ensure that the underlying network configuration supports a secure operating environment for MongoDB deployments, and appropriately limits access to MongoDB deployments.
Access Control Tutorials
These tutorials describe procedures relevant for the configuration, operation, and maintenance of MongoDB’s access control system.
User and Role Management Tutorials
MongoDB’s access control system provides a flexible role-based access control system that you can use to limit access to MongoDB deployments. The tutorials in this section describe the configuration an setup of the authorization system.

Continue reading from Security Tutorials for additional tutorials that address the use and management of secure MongoDB deployments.

Create a Vulnerability Report
Report a vulnerability in MongoDB.
Security Reference
Reference for security related functions.
Security Checklist
A high level overview of global security consideration for administrators of MongoDB deployments. Use this checklist if you are new to deploying MongoDB in production and want to implement high quality security practices.