In this section, you'll learn how to configure a mongod (MongoDB server daemon) instance to communicate with clients and peers in a secure manner. In this section, we discuss how to secure communications to and from a mongod instance. We also discuss securing communications between the mongo shell and a mongod instance. The sections that follow cover who can connect to the MongoDB database, and what that person (or role) is allowed to do.
As your database grows in size and you implement a sharded cluster, you can secure the mongos used to route requests to shards in exactly the same manner described in this section.
Before we get going on the details, however, we need to first examine what is meant by transport layer.