Application must support the ability to connect to a running MongoDB deployment that utilizes built-in authentication. Specifically, tools must provide the ability for users to specify a valid username and password to authenticate against MongoDB. For more information, refer to http://docs.mongodb.org/manual/core/access-control/#authentication.
Application must support the ability to connect to a running MongoDB deployment that utilizes Kerberos (external) authentication. Specifically, tools must provide the ability for users to specify their Kerberos username and password to authenticate to the external authentication provider, via MongoDB. For more information, refer to http://docs.mongodb.org/manual/tutorial/control-access-to-mongodb-with-kerberos-authentication/.
Encryption
Applications must support the ability to connect to a running MongoDB deployment that utilizes SSL to encrypt data in-transit between the application and the database. Tools must provide users the ability to connect with or without an SSL certificate. Users should be able to supply a CA or self-signed certificate and connect to the MongoDB deployment. For more information, refer to http://docs.mongodb.org/manual/tutorial/configure-ssl/.
Vulnerabilities
Application should evaluate MongoDB deployments by examining the following on each instance (i) command-line parameters supplied to MongoDB, (ii) MongoDB configuration file, (iii) parameters from MongoDB startup (e.g. init.d) script. For more information, refer to: