25
SECURITY Monika Mathur FullStack Developer Habilelabs.io

MongoDB Security Introduction - Presentation

Embed Size (px)

Citation preview

Page 1: MongoDB Security Introduction - Presentation

SECURITY

Monika MathurFullStack Developer

Habilelabs.io

Page 2: MongoDB Security Introduction - Presentation

CONTENTS

1. Introduction MongoDB security

2. Why mongoDB security important

3. How to secure your mongodb

Page 3: MongoDB Security Introduction - Presentation

SECURITY

Page 4: MongoDB Security Introduction - Presentation

Niall Merrigan, security researcher and Microsoft developer based in norway, has been tracking the mongodb ransom incidents, and in one day, he saw the number of attacks more than double from 12,000 to 27,633.

SECURITY ATTACKS

Page 5: MongoDB Security Introduction - Presentation

Attackers have been accessing databases, copying files, deleting everything and leaving a ransom note promising the return of the data for a fee.

WHAT HACKER DO WITH DATABASES

Page 6: MongoDB Security Introduction - Presentation

SECURE YOUR DATABASE

Page 7: MongoDB Security Introduction - Presentation

REFERENCE ARCHITECTURE

Clients

Storage

Administrators

Authentication Authorization Auditing Encryption

Page 8: MongoDB Security Introduction - Presentation

AUTHENTICATION

Clients

Storage

Administrators

Authentication Authorization Auditing Encryption

Which users/apps are accessing the

DB

Which nodes are joining the cluster

Which users are accessing

the DB

Page 9: MongoDB Security Introduction - Presentation

AUTHENTICATION MECHANISM

Client/User Auth• SCRAM-SHA-1

• MONGODB-CR

• X.509

• LDAP

• Kerberos

Internal Auth• Keyfile (SCRAM-SHA-1)

• X.509

Page 10: MongoDB Security Introduction - Presentation

AUTHENTICATION MECHANISM

SCARAM-SHA-1

MONGODB-CR

X.509

LDAP

Kerberos

Community

Page 11: MongoDB Security Introduction - Presentation

AUTHORIZATION

Clients

Storage

Administrators

Authentication Authorization Auditing Encryption

What permissions does an App

have?

What permissions

does an Admin have?

What data can a user see?

What data can an admin see?

Page 12: MongoDB Security Introduction - Presentation

WHY ROLE BASE ACCESS CONTROL

Page 13: MongoDB Security Introduction - Presentation

BUILT IN ROLES

Page 14: MongoDB Security Introduction - Presentation

USER-DEFINED ROLES

Page 15: MongoDB Security Introduction - Presentation

ACTIONS

Page 16: MongoDB Security Introduction - Presentation

RESOURCES

Page 17: MongoDB Security Introduction - Presentation

AUDITING

Clients

Storage

Administrators

Authentication Authorization Auditing Encryption

Who made which changes

and when?

Who made which changes

and when?

Page 18: MongoDB Security Introduction - Presentation

AUDITING

1. Add accountability

2. Investigate suspicious activity

3. Monitor database activity

Page 19: MongoDB Security Introduction - Presentation

AUDITING

Page 20: MongoDB Security Introduction - Presentation

ENCRYPTION

Clients

Storage

Administrators

Authentication Authorization Auditing Encryption

SSL Encryption

SSL Encryption

File system Encryption

Page 21: MongoDB Security Introduction - Presentation

ENCRYPTION TYPE

1. Transport Encryption

2. Encryption at rest

Page 22: MongoDB Security Introduction - Presentation

TRANSPORT ENCRYPTION

Page 23: MongoDB Security Introduction - Presentation

ENCRYPTION AT REST

Page 24: MongoDB Security Introduction - Presentation

Thank You

Page 25: MongoDB Security Introduction - Presentation

CONTACT US

• Development Center :Habilelabs Pvt. Ltd.4th Floor, I.G.M. Senior Secondary Public School Campus,Sec-93 Agarwal Farm, Mansarovar, Jaipur(Raj.) – 302020

• Email : [email protected]

• Web : https://habilelabs.io

• Telephone: +91-9828247415 / +91-9887992695