AI SummaryA comprehensive MongoDB security and administration agent that teaches and implements authentication methods (SCRAM/X.509/LDAP), role-based access control, encryption, and enterprise compliance strategies. Ideal for developers and DBAs securing MongoDB deployments in production environments.
Install
Copy this and paste it into Claude Code, Cursor, or any AI assistant:
I want to set up the "06-mongodb-security-administration" agent in my project. Please run this command in my terminal: # Add AGENTS.md to your project root curl --retry 3 --retry-delay 2 --retry-all-errors -o AGENTS.md "https://raw.githubusercontent.com/pluginagentmarketplace/custom-plugin-mongodb/main/agents/06-mongodb-security-administration.md" Then explain what the agent does and how to invoke it.
Description
Master MongoDB security, authentication, authorization, and database administration. Learn SCRAM/X.509/LDAP authentication, role-based access control, encryption, TLS, audit logging, backup strategies, and compliance for enterprise deployments.
Agent Overview
This agent specializes in MongoDB security and operational administration, essential for protecting sensitive data and maintaining compliance in production deployments. Master authentication methods (SCRAM, X.509, LDAP, Kerberos), role-based access control, encryption at rest and in transit, audit logging, backup strategies, and security hardening techniques. You'll learn: All authentication methods, authorization and RBAC, built-in and custom roles, encryption (at-rest and in-transit), TLS configuration, audit logging, backup procedures, disaster recovery, and compliance (HIPAA, PCI-DSS, GDPR, SOC2).
MongoDB Security & Administration Specialist
Secure MongoDB deployments with encryption, authentication, and compliance.
Core Competencies
• Authentication: • SCRAM authentication • X.509 certificate authentication • LDAP authentication • Kerberos authentication • Default admin user • Password policies • Authentication database • Authorization (RBAC): • Built-in roles • Custom roles • Role inheritance • Database privileges • Collection privileges • Cluster administration roles • Fine-grained access control • Built-in Roles: • Admin roles (root, dbAdmin, etc.) • Data roles (read, readWrite) • Cluster roles (clusterAdmin, clusterManager) • Backup/restore roles • Monitoring roles • Encryption: • Encryption at rest (WiredTiger engine) • Encryption in transit (TLS/SSL) • TLS configuration • Certificate management • Encryption key management • Field-level encryption • Network Security: • Firewall rules • Network isolation • VPC/VPN setup • IP whitelisting • Bind IP configuration • Network segmentation • Audit Logging: • Audit log configuration • Logged events • Audit log filters • Storing audit logs • Compliance reporting • Security event tracking • Backup & Disaster Recovery: • Backup strategies and timing • Backup retention policies • Point-in-time recovery • Testing restore procedures • Backup encryption • Off-site backup storage • User Management: • Creating users • Modifying roles • Removing users • Password management • User account lifecycle • Service accounts • Operational Security: • Change logs and audit trails • Configuration management • Security scanning • Vulnerability management • Patch management • Security updates
Learning Path
• Authentication Basics (1 week) • SCRAM authentication setup • User creation • Password policies • Authentication database • Authorization (1-2 weeks) • Role-based access control • Built-in roles • Custom role design • Privilege assignment • Encryption & Network (1-2 weeks) • TLS/SSL configuration • Encryption at rest • Network security • Certificate management • Audit & Compliance (1 week) • Audit logging setup • Compliance requirements • Log analysis • Security monitoring • Operations & Disaster Recovery (2 weeks) • Backup procedures • Disaster recovery • Operational procedures • Security policies
Discussion
Health Signals
My Fox Den
Community Rating
Sign in to rate this booster