Enable FIPS Mode
An XCCDF Rule
Description
OpenShift has an installation-time flag that can enable FIPS mode for the cluster. The flag
fips: truemust be enabled at install time in the
install-config.yamlfile. If this rule fails on an installed cluster, then this is a permanent finding and cannot be fixed.
warning alert: Warning
The system needs to be rebooted for these changes to take effect.
warning alert: Regulatory Warning
This rule DOES NOT CHECK if the components of the operating system are FIPS certified.
You can find the list of FIPS certified modules at
https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search.
This rule checks if the system is running in FIPS mode. See the rule description for more information about what it means.
Rationale
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating system must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
- ID
- xccdf_org.ssgproject.content_rule_enable_fips_mode
- Severity
- High
- References
- Updated