Skip to content

Conversation

karenzone
Copy link
Contributor

@karenzone karenzone commented Jul 15, 2025

PREVIEWS:
https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2136/deploy-manage/security/fips
https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2136/deploy-manage/security/fips-es
https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2136/deploy-manage/security/fips-kib
https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2136/deploy-manage/security/fips-ingest

Related:

Checklist

  • Vet approach. Is this content heading in the right direction?
  • Vet basic structure
    • Broke out ES and KIB for scan-ability
    • Set up structure for scaling as we add more FIPS-compatible deliverables
    • Moved FIPS topic from Deploy and Manage > Security > Secure your cluster or deployment to Deploy and Manage > Security to allow for expansion, SEO, and findability.
  • Align on terminology
    • FIPS compliant?
    • FIPS compatible?
    • FIPS mode?
  • Add binary location and explain what they're getting (https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2136/deploy-manage/security/fips-ingest#fips-binaries)
    • User responsibilities
  • Redirects for FIPS topic and relocated ES and Kibana topics (if needed)
  • Replace "above" and "below" links with more descriptive text (for better SEO ranking and for readability).
    Might happen in another PR.

@karenzone karenzone self-assigned this Jul 15, 2025
Copy link
Contributor

@simitt simitt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @karenzone for the initial architecture; the split into product categories looks good to me.

Left some initial comments, but I will need to spend more time on finding some more user friendly wording for the removed/changed functionality.

As a general guideline, I would suggest we list the removed functionality as limititation, but do not list configuration options that themselves are just not FIPS compliant. We can do an overall callout on these but would keep this separated from functional limitations. I'll provide more thorough suggestions for this.

@simitt

This comment was marked as resolved.

Co-authored by: Silvia Mitter <[email protected]>
@tommyers-elastic
Copy link

tommyers-elastic commented Jul 18, 2025

i think it might be good to add a section to the 'FIPS for ingest tools' page for "Integrations".

we have several integrations which are currently not FIPS compatible. calling these out here would avoid suprises for customers who don't learn they're unsupported until they try to install them. we list the equivalent metricbeat modules, so it makes sense to also list the Integrations that depend on them.

you can see which packages are currently not FIPS compatible by checking the for fips_compatible: false in the package manifest file - https://github.com/search?q=repo%3Aelastic%2Fintegrations%20%22fips_compatible%3A%20false%22&type=code

cc @shmsr

@karenzone
Copy link
Contributor Author

i think it might be good to add a section to the 'FIPS for ingest tools' page for "Integrations".

we have several integrations which are currently not FIPS compatible. calling these out here would avoid suprises for customers who don't learn they're unsupported until they try to install them. we list the equivalent metricbeat modules, so it makes sense to also list the Integrations that depend on them.

@tommyers-elastic @shmsr (and others who are interested):
Does the treatment of the new content make it obvious that we're not guaranteeing that other integrations are compliant--only that we can guarantee that these seven are not?

@karenzone karenzone marked this pull request as ready for review July 19, 2025 01:49
@karenzone karenzone requested review from a team as code owners July 19, 2025 01:49
@tommyers-elastic
Copy link

@karenzone by default we are saying that intergrations are compatible. but the boolean flag itself doesn't really make any promises about compliance - this is handled at the beats level (hence 'compatible', not 'compliant'). the flag is really like a hint for fleet so we can say to the customer "hey this integration isn't gonna work because it depends on modules that are not in the FIPS version of agent".

hope that makes sense.

@karenzone karenzone force-pushed the 1735-fips branch 3 times, most recently from 043bbf1 to 4eaa2ba Compare July 21, 2025 18:05
Copy link
Contributor

@simitt simitt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did another round of review and left some small comments.

Copy link
Contributor

@simitt simitt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@karenzone as just discussed, added some missing imitations.

@karenzone
Copy link
Contributor Author

@karenzone by default we are saying that intergrations are compatible. but the boolean flag itself doesn't really make any promises about compliance - this is handled at the beats level (hence 'compatible', not 'compliant'). the flag is really like a hint for fleet so we can say to the customer "hey this integration isn't gonna work because it depends on modules that are not in the FIPS version of agent".

hope that makes sense.

Thanks for the suggestion. We worked the content into https://docs-v3-preview.elastic.dev/elastic/docs-content/pull/2136/deploy-manage/security/fips-ingest#ingest-limitations-agent. The query you provided was helpful in compiling the list and links. Thank you!

Copy link
Contributor

@simitt simitt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - thanks for all the work on putting this together!

Copy link
Contributor

@kilfoyle kilfoyle left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 🏎️
Very nice work @karenzone!

@karenzone karenzone merged commit f1694ad into elastic:main Jul 24, 2025
7 of 8 checks passed
@karenzone karenzone deleted the 1735-fips branch July 24, 2025 21:04
@karenzone
Copy link
Contributor Author

Note to reviewers and others who are interested

We are still collecting info and feedback for a quick-follow PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants