This document provides an overview and guidance on MongoDB security. It discusses authentication, role-based access control, auditing, encryption, and hardening deployments. It then details concepts like authentication mechanisms, authorization with roles and privileges, network exposure configuration, and API security. Finally it includes tutorials for security best practices, network configuration like firewalls and SSL, deployment, access control, user/role management, and auditing.