Checks whether Internet access is disabled for each ApsaraDB for MongoDB instance. If so, the evaluation result is Compliant. Checks whether Internet access is enabled for each MongoDB instance and the instance denies access over the Internet. If so, the evaluation result is also Compliant.

Scenarios

If 0.0.0.0/0 is added to the IP whitelist of a MongoDB instance, the instance can be accessed from all CIDR blocks. This causes data security risks. Proceed with caution when you add 0.0.0.0/0 to the IP whitelist of a MongoDB instance.

Risk level

Default risk level: high.

When you configure this rule, you can change the risk level based on your business requirements.

Compliance evaluation logic

  • If Internet access is disabled for each MongoDB instance, the evaluation result is Compliant. If Internet access is enabled for each MongoDB instance and the instance denies access over the Internet, the evaluation result is also Compliant.
  • If Internet access is enabled for a MongoDB instance and the instance allow access over the Internet, the evaluation result is Incompliant. For more information about how to remediate an incompliant configuration, see Incompliance remediation.

Rule details

ItemDescription
Rule namemongodb-public-and-any-ip-access-check
Rule identifiermongodb-public-and-any-ip-access-check
TagMongoDB and Public
Automatic remediationNot supported
Trigger typePeriodic execution
Evaluation frequencyInterval of 24 hours
Supported resource typeMongoDB instances
Input parameterNone

Incompliance remediation

Disable Internet access for a MongoDB instance or configure an IP whitelist for a MongoDB instance to deny access over the Internet. For more information, see Configure a whitelist or an ECS security group for an ApsaraDB for MongoDB instance.