Discover how to create secure deployments of MongoDB for production-ready environments. In this course, Kirby Kohlmorgen shows how to use this document database’s native and third-party integration security features and resources to ensure the security of your MongoDB deployments. Kirby covers authentication mechanisms and methods, and dives into authorization and encryption, discussing built-in and user-defined roles, how to create and grant privileges to a role, and transport encryption. He also goes into auditing—including how to configure an audit from the command line—and security checklists and reports. By the end of this course, you’ll have the knowledge needed to deploy a secure MongoDB cluster, configure the role-based authorization model to your needs, set up encryption, do proper auditing, and follow security best practices.
This course was created by MongoDB University. We are pleased to host this training in our library.
- Authentication vs. authorization
- Authentication methods
- Authorization and encryption
- Role-based access control
- Creating a sys admin
- Granting new privileges to a role
- Describing auditing capabilities
- Enabling the first audit filter
- Security checklists and reports
Skill Level Advanced