Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      Prompting Is A Design Act: How To Brief, Guide And Iterate With AI

      August 29, 2025

      Look out, Meta Ray-Bans! These AI glasses just raised over $1M in pre-orders in 3 days

      September 2, 2025

      Samsung ‘Galaxy Glasses’ powered by Android XR are reportedly on track to be unveiled this month

      September 2, 2025

      The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal

      September 2, 2025

      Distribution Release: Linux From Scratch 12.4

      September 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025
      Recent

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025

      August report 2025

      September 2, 2025

      Fake News Detection using Python Machine Learning (ML)

      September 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025
      Recent

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025

      Download Transcribe! for Windows

      September 1, 2025

      Microsoft Fixes CertificateServicesClient (CertEnroll) Error in Windows 11

      September 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Databases»Now Generally Available: 7 New Resource Policies to Strengthen Atlas Security

    Now Generally Available: 7 New Resource Policies to Strengthen Atlas Security

    April 14, 2025

    Organizations demand for a scalable means to enforce security and governance controls across their database deployments without slowing down developer productivity. To address this, MongoDB introduced resource policies in public preview on February 10th, 2025. Resource policies enable organization administrators to set up automated, organization-wide ‘guardrails’ for their MongoDB Atlas deployments. At public preview, three policies were released to this end.

    Today, MongoDB is announcing the general availability of resource policies in MongoDB Atlas. This release introduces seven additional policies and a new graphical user interface (GUI) for creating and managing policies. These enhancements give organizations greater control over MongoDB Atlas configurations, simplifying security and compliance automation.

    How resource policies enable secure innovation

    Innovation is essential for organizations to maintain competitiveness in a rapidly evolving global landscape. Companies with higher levels of innovation outperformed their peers financially, according to a Cornell University study analyzing S&P 500 companies between 1998 and 20231. One of the most effective ways to drive innovation is by equipping developers with the right tools and giving them the autonomy to put them into action2.

    However, without standardized controls governing those tools, developers can inadvertently configure Atlas clusters to deviate from corporate or regulatory best practices. Manual approval processes for every new project create delays. Concurrently, platform teams struggle to enforce consistent security policies across the organization, leading to increased complexity and costs.

    As cybersecurity threats evolve daily and regulations tighten, granting developers autonomy and quickly provisioning access to essential tools can introduce risks. Organizations must implement strong security measures to maintain compliance and enable secure innovation.

    Resource policies empower organizations to enforce security and compliance standards across their entire Atlas environment. Instead of targeting specific user groups, these policies establish organization-wide guardrails to govern how Atlas can be configured. This reduces the risk of misconfigurations and security gaps.

    With resource policies, security and compliance standards are applied automatically across all Atlas projects and clusters. This eliminates the need for manual approvals. Developers gain self-service access to the resources they need while remaining within approved organizational boundaries. Simultaneously, platform teams can centrally manage resource policies to ensure consistency and free up time for strategic initiatives.

    Resource policies strengthen security, streamline operations, and help accelerate innovation by automating guardrails and simplifying governance. Organizations can scale securely while empowering developers to move faster without compromising compliance.

    What resource policies are available?

    Policy TypeDescriptionAvailable Since
    Restrict cloud providerEnsure clusters are only deployed on approved cloud providers (AWS, Azure, or Google Cloud). This prevents accidental or unauthorized deployments in unapproved environments. This supports organizations in meeting regulatory or business requirements.Public preview
    Restrict cloud regionLimit cluster deployments in approved cloud providers to specific regions. This ensures data residency compliance, optimizes performance by keeping data close to users, and helps control cloud costs.Public preview
    Block wildcard IPReduce exposure to unauthorized access attempts by disabling the use of 0.0.0.0/0 (wildcard IP) in IP access lists. This enforces more restrictive network access policies, ensuring only explicitly approved IP addresses or private connectivity methods (such as VPC peering or private endpoints) are used.Public preview
    Enforce Atlas cluster size limitsSet minimum and maximum cluster sizes to control costs and optimize performance, preventing unexpected infrastructure expenses while ensuring efficient resource usage.General availability
    Restrict IP access list modificationsRestrict public access options by preventing new IP access list entries, encouraging connections through VPC peering or private endpoints.General availability
    Restrict VPC peering modificationsMaintain secure cross-VPC communication by preserving existing VPC peering configurations while blocking future changes.General availability
    Restrict private endpoint modificationsProtect private network connections by keeping existing Private Endpoint configurations intact and preventing unauthorized modifications.General availability
    Enforce minimum TLS versionEnforce modern TLS versions that prevent outdated encryption protocols from exposing your systems to vulnerabilities.General availability
    Restrict TLS cipher suitesSpecify a set of TLS cipher suites to balance security, compatibility, and compliance.General availability
    Require maintenance windowsImplement mandatory maintenance windows for all Projects to improve operational predictability and create a structured framework for controlled system updates.General availability

    When resource policies first launched in public preview, organizations could use them to enforce consistency in deployment configurations and strengthen access controls. These foundational policies helped teams ensure security and compliance requirements were being followed automatically:

    • Restrict cloud provider

    • Restrict cloud region

    • Block wildcard IP

    The three inaugural policies available in public preview established a strong foundation for securing MongoDB Atlas environments while enabling self-service access for developers. With the general availability of resource policies, MongoDB is expanding its capabilities with seven additional policies designed to strengthen security, streamline compliance, and improve operational governance. These additions give organizations greater control over cluster configurations, network access, encryption standards, and maintenance schedules.

    Without predefined guardrails, Atlas clusters can grow beyond manageable limits. Organizations are therefore prone to unforeseen infrastructure expenses and increased resource management complexity. To anticipate this risk, MongoDB has introduced the ‘Enforce Atlas cluster size limits’ resource policy to define and police relevant parameters.

    Uncontrolled network access can expose sensitive data and increase security risks. Without guardrails, organizations may inadvertently allow overly permissive connections. This weakens security policy enforcement and puts compliance at risk. To mitigate these risks, the following resource policies have been introduced to ensure strict control over network configurations:

    • Restrict IP access list modifications

    • Restrict VPC peering modifications

    • Restrict private endpoint modifications

    Weak or outdated encryption can leave sensitive data vulnerable to interception and compromise. Without strict enforcement of encryption standards, organizations risk non-compliance and exposure to evolving cybersecurity threats. To maintain robust data protection, MongoDB is introducing the following two resource policies to strengthen encryption controls:

    • Enforce minimum TLS version

    • Restrict TLS cipher suites

    Unplanned maintenance can lead to downtime, operational disruptions, and inconsistent system updates. Without a structured approach, organizations will struggle to coordinate upgrades and minimize the impact on critical workloads. To enhance operation predictability, MongoDB has introduced the ‘Require maintenance windows’ resource policy to standardize maintenance scheduling.

    Creating and managing resource policies

    With the general availability of resource policies, organizations can now create and manage policies through the Atlas user interface (UI) and programmatically. This flexibility allows teams to enforce security, compliance, and operational standards in a way that aligns with their existing workflows.

    For infrastructure automation, resource policies can be defined using infrastructure-as-code (IaC) tools like Terraform and CloudFormation or integrated directly via the Atlas Admin API. This enables organizations to apply policies consistently across their environments while maintaining agility.

    Resource policies in Atlas are written using Cedar, an open-source policy language designed for both expressiveness and ease of use. Cedar’s concise syntax simplifies policy creation and management. This makes it easier for teams to enforce guardrails without unnecessary complexity.

    To see the process of creating a resource policy through the Atlas UI in action, consider this example: A global financial services company uses MongoDB Atlas to support business-critical applications. To control costs and ensure performance consistency, the company wants to implement a resource policy restricting cluster provisioning to between M30 and M60.

    To create the policy through the Atlas UI, a platform engineer would start by navigating to Organization Settings. They would then navigate to the Resource Policies page and select Create Policy to initiate the setup process.

    Figure 1. The Resource Policies section within organization settings in the Atlas UI.
    Screenshot of the resource policies section within organization setting in the Atlas UI. The screenshot shows the main UI as well as the left side NAV.

    Next, the platform engineer would name the policy and provide a description. In this example, the policy is named “Restrict Cluster Tier,” with the description: “Restrict Atlas from provisioning or scaling clusters to less than M30 or greater than M60.”

    Figure 2. The process of naming and providing a description for a new resource policy.
    Screenshot of the Atlas UI showing how to name and provide a description for a new resource policy.

    After naming the policy and providing a description, the next step is to define the policy using Cedar. In this case, the policy includes a when clause that restricts Atlas from provisioning or scaling clusters to less than M30 or greater than M60.

    Figure 3. The new resource policy is defined using the Cedar policy language.
    Screenshot of the Atlas UI showing the Cedar policy field now filled in the Create Policy window.

    Finally, the policy is created and activated by clicking Create Policy. Once completed, the platform engineer can view an overview of the newly created policy.

    Figure 4. An overview of the newly created resource policy.
    Screenshot of the Atlas UI window showing an overview of a newly created resource policy.

    This resource policy now applies to all newly provisioned Atlas projects and clusters. For existing clusters that exceed or fall below the policy’s limits, Atlas only allows modifications that adjust them to comply with the policy. By implementing this policy, the financial services company prevents overspending. Concurrently, they ensure that production workloads run on appropriately sized clusters. Additionally, non-critical environments are prevented from consuming excessive resources.

    Getting started with resource policies

    Resource policies are now generally available in MongoDB Atlas. Get started creating and managing resource policies through the Atlas user interface or programmatically using infrastructure-as-code tools like Terraform or CloudFormation. Alternatively, integrate directly with the Atlas Admin API. Use the resources below to learn more about resource policies.

    • Feature documentation

    • Postman Collection

    • Terraform Provider documentation

    • AWS Cloud Formation documentation

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat to work on next?
    Next Article ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

    Related Posts

    Development

    Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

    September 2, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Ubuy Scales E-Commerce Globally and Unlocks AI With MongoDB

    Databases

    CVE-2025-26074 – Orkes Conductor Java Deserialization Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Epson Scan Not Working on Windows 11: How to Fix it

    Operating Systems

    CVE-2025-7814 – Food Ordering Review System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    News & Updates

    PowerToys, one of the best free apps on Windows 11, just got a major update

    April 1, 2025

    Microsoft PowerToys just got a big update, adding a new Command Palette, improved Color Picker,…

    New ModSecurity WAF Vulnerability Let Attackers Crash the System

    June 3, 2025

    LightOn AI Released GTE-ModernColBERT-v1: A Scalable Token-Level Semantic Search Model for Long-Document Retrieval and Benchmark-Leading Performance

    May 11, 2025

    A generalist AI agent for 3D virtual environments

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.