Docs Menu

Configure Security Features for Database Deployments

On this page

You can use Atlas securely out of the box. Atlas comes preconfigured with secure default settings. You can fine-tune the security features for your database deployments to meet your unique security needs and preferences. Review the following security features and considerations for database deployments.

The following security features are part of the Atlas product:

Atlas requires TLS/SSL to encrypt the connections to your databases.

To configure SSL or TLS OCSP certificate revocation checking, see OCSP Certificate Revocation Check.

All Atlas projects with one or more M10+ dedicated clusters receive their own dedicated VPC (or VNet if you use Azure). Atlas deploys all dedicated clusters inside this VPC or VNet.

By default, Atlas encrypts all data stored on M10+ Atlas clusters. If your existing cluster doesn't have encryption enabled, you can enable encryption by editing your Cluster Tier. Atlas also supports Encryption at Rest using your Key Management.

You must configure the following security features:

Make sure your application can reach your MongoDB Atlas environment. To add the inbound network access from your application environment to Atlas, do one of the following:

  1. Add the public IP addresses to your IP access list
  2. Use VPC / VNet peering to add private IP addresses.
  3. Add private endpoints.
Tip
See also:

If your firewall blocks outbound network connections, you must also open outbound access from your application environment to Atlas. You must configure your firewall to allow your applications to make outbound connections to ports 27015 to 27017 to TCP traffic on Atlas hosts. This grants your applications access to databases stored on Atlas.

Note

By default, MongoDB Atlas clusters do not need to be able to initiate connections to your application environments. If you wish to enable Atlas clusters with LDAP authentication and authorization, you must allow network access from Atlas clusters directly to your secure LDAP. You can allow access to your LDAP by using public or private IPs as long as a public DNS hostname points to an IP that the Atlas clusters can access.

If you are not using VPC / VNet peering and plan to connect to Atlas using public IP addresses, see the following pages for additional information:

Atlas only allows client connections to the database deployment from entries in the project's IP access list. To connect, you must add an entry to the IP access list. To set up the IP access list for the project, see Configure IP Access List Entries.

For Atlas clusters deployed on Google Cloud Platform (GCP) or Microsoft Azure, add the IP addresses of your Google Cloud or Azure services to Atlas project IP access list to grant those services access to the cluster.

Atlas requires clients to authenticate to connect to the database. You must create database users to access the database. To set up database users to your database deployments, see Configure Database Users. Atlas offers many security features for database deployment authentication and authorization.

To access database deployments in a project, users must belong to that project. Users can belong to multiple projects.

You may configure the following security features:

Atlas supports peering connections with other AWS, Azure, or Google Cloud network peering connections. To learn more, see Set Up a Network Peering Connection.

Important

If this is the first M10+ dedicated paid cluster for the selected region or regions and you plan on creating one or more VPC peering connections, please review the documentation on VPC peering connections before continuing.

Atlas supports private endpoints on:

To use private endpoints, see Set Up a Private Endpoint for a Dedicated Cluster.

Some Atlas features, including Data Lakes and Encryption at Rest using Customer Key Management, use AWS IAM roles for authentication.

To set up an AWS IAM role for Atlas to use, see Set Up Unified AWS Access.

Atlas offers the following security features for database deployment authentication and authorization.

Atlas requires clients to authenticate to access database deployments. You must create database users to access the database. To set up database users for your database deployments, see Configure Database Users.

Atlas supports creating custom roles for database authrozaition in cases where the built-in Atlas roles don't grant your desired set of privileges.

You can set up passwordless authentication for your AWS IAM users in the following ways:

Atlas supports performing user authentication and authorization with LDAP. To use LDAP, see Set Up User Authentication and Authorization with LDAP.

X.509 client certificates provide database users access to the database deployments in your project. Options for X.509 authentication include Atlas-managed X.509 authentication and self-managed X.509 authentication. To learn more about self-managed X.509 authentication, see Set Up Self-Managed X.509 Authentication.

Organization owners can restrict MongoDB Production Support Employees from accessing Atlas backend infrastructure for any Atlas database deployment in their organization. Organization owners may grant a 24 hour bypass to the access restriction at the Atlas database deployment level.

Important

Blocking infrastructure access from MongoDB Support may increase support issue response and resolution time and negatively impact your database deployment's availability.

To enable this option, see Restrict MongoDB Support Access to Atlas Backend Infrastructure.

Atlas supports using AWS KMS, Azure Key Vault, and Google Cloud to encrypt storage engines and cloud provider backups. To use encryption at rest, see Encryption at Rest using Customer Key Management.

Atlas supports client-side field level encryption, including automatic encryption of fields. All Atlas users are entitled to use MongoDB's automatic client-side field level encryption features.

To learn more, see Client-Side Field Level Encryption Requirements.

Note

MongoDB Compass, the Atlas UI, and the MongoDB Shell (mongosh) do not support decrypting client-side field level-encrypted fields.

Atlas supports auditing all system event actions. To use database auditing, see Set up Database Auditing.

Atlas surfaces authentication logs directly in the Atlas UI so that you can easily review successful and unsuccesful authentication attempts made against your database deployments. To view your database access history, see View Database Access History.

Atlas supports MFA to help you control access to your Atlas accounts. To set up MFA, see Manage Your Multi-Factor Authentication Options.

If you use any of the following Atlas features, you might have to add Atlas IP addresses to your network's IP access list:

If your network allows outbound HTTP requests only to specific IP addresses, you must allow access to the following IP addresses so that your API requests can reach the Atlas control plane:

3.214.160.189
13.248.140.125
13.248.203.97
13.248.214.115
18.210.185.2
18.210.245.203
18.232.30.107
18.235.209.93
34.192.82.120
34.194.131.15
34.194.251.66
34.195.194.204
34.227.138.166
34.230.213.36
34.233.152.179
34.233.179.140
35.172.148.213
35.172.245.18
54.147.76.65
54.204.237.208
75.2.1.110
76.223.14.2
76.223.77.37
76.223.84.31
99.83.223.45

If your network allows inbound HTTP requests only from specific IP addresses, you must allow access from the following IP addresses so that Atlas can communicate with your webhooks and KMS:

3.92.113.229
3.208.110.31
3.211.96.35
3.212.79.116
3.214.203.147
3.215.10.168
3.215.143.88
18.214.178.145
18.235.30.157
18.235.48.235
18.235.145.62
34.193.91.42
34.193.242.51
34.196.151.229
34.200.66.236
34.235.52.68
34.236.228.98
34.237.40.31
35.153.40.82
35.169.184.216
35.171.106.60
35.174.179.65
35.174.230.146
35.175.93.3
35.175.94.38
35.175.95.59
50.19.91.100
52.71.233.234
52.73.214.87
52.87.98.128
54.145.247.111
54.163.55.77
100.26.2.217
107.20.0.247
107.20.107.166

If your network allows outbound requests to specific IP addresses only, you must allow access to the following IP addresses on TCP port 27017 so that your requests can reach Data Lake:

18.204.47.197
34.237.78.67
54.91.120.155
34.217.220.13
54.203.115.97
54.69.142.129
108.129.35.102
18.200.7.156
99.81.123.21
3.8.218.156
3.9.125.156
3.9.90.17
18.196.201.253
3.122.67.212
35.158.226.227
13.54.14.65
52.64.205.136
3.6.3.105
65.1.222.250

If your network allows outbound requests to specific IP addresses only, to allow SSL or TLS OCSP certificate revocation checking, you must allow access to Atlas' CA (Certificate Authority) OCSP Responder servers that can be found in the OCSP URL of the SSL or TLS certificate.

To disable OCSP certificate revocation checking, refer to the documentation for the MongoDB driver version that your application uses.

←  Troubleshoot Connection IssuesConfigure Cluster Access with the Quickstart Wizard →
Give Feedback
© 2022 MongoDB, Inc.

About

  • Careers
  • Investor Relations
  • Legal Notices
  • Privacy Notices
  • Security Information
  • Trust Center
© 2022 MongoDB, Inc.