diff --git a/deploy-manage/security/fips-140-2.md b/deploy-manage/security/fips-es.md similarity index 70% rename from deploy-manage/security/fips-140-2.md rename to deploy-manage/security/fips-es.md index 58a6b90dc7..3d0d65ddd8 100644 --- a/deploy-manage/security/fips-140-2.md +++ b/deploy-manage/security/fips-es.md @@ -1,53 +1,17 @@ --- -mapped_pages: - - https://www.elastic.co/guide/en/elasticsearch/reference/current/fips-140-compliance.html - - https://www.elastic.co/guide/en/kibana/current/xpack-security-fips-140-2.html applies_to: deployment: self: ga products: - id: elasticsearch - - id: kibana --- -# FIPS 140-2 compliance +# FIPS compliance for {{es}} [fips-elasticsearch] -$$$configuring-es-yml$$$ -$$$fips-cached-password-hashing$$$ - -$$$fips-limitations$$$ - -$$$fips-stored-password-hashing$$$ - -$$$fips-tls$$$ - -$$$fips-upgrade-considerations$$$ - -$$$java-security-manager$$$ - -$$$java-security-provider$$$ - -$$$keystore-fips-password$$$ - -$$$verify-security-provider$$$ - -The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), titled "Security Requirements for Cryptographic Modules" is a U.S. government computer security standard used to approve cryptographic modules. -- [{{es}}](#fips-elasticsearch) offers a FIPS 140-2 compliant mode and as such can run in a FIPS 140-2 configured JVM. -- [{{kib}}](#fips-kibana) offers a FIPS 140-2 compliant mode and as such can run in a Node.js environment configured with a FIPS 140-2 compliant OpenSSL3 provider. - -:::{note} -If you are running {{es}} through {{eck}}, refer to [ECK FIPS compatibility](/deploy-manage/deploy/cloud-on-k8s/deploy-fips-compatible-version-of-eck.md). -::: - -## {{es}} [fips-elasticsearch] - - - -::::{important} +:::{important} The JVM bundled with {{es}} is not configured for FIPS 140-2. You must configure an external JDK with a FIPS 140-2 certified Java Security Provider. Refer to the {{es}} [JVM support matrix](https://www.elastic.co/support/matrix#matrix_jvm) for supported JVM configurations. See [subscriptions](https://www.elastic.co/subscriptions) for required licensing. -:::: - +::: Compliance with FIPS 140-2 requires using only FIPS approved / NIST recommended cryptographic algorithms. Generally this can be done by the following: @@ -56,26 +20,30 @@ Compliance with FIPS 140-2 requires using only FIPS approved / NIST recommended * Setting `xpack.security.fips_mode.enabled` to `true` in [`elasticsearch.yml`](/deploy-manage/stack-settings.md). Note - this setting alone is not sufficient to be compliant with FIPS 140-2. -### Configuring {{es}} for FIPS 140-2 [_configuring_es_for_fips_140_2] +:::{note} +If you are running {{es}} through {{eck}}, refer to [ECK FIPS compatibility](/deploy-manage/deploy/cloud-on-k8s/deploy-fips-compatible-version-of-eck.md). +::: + +## Configuring {{es}} for FIPS 140-2 [_configuring_es_for_fips_140_2] Detailed instructions for the configuration required for FIPS 140-2 compliance is beyond the scope of this document. It is the responsibility of the user to ensure compliance with FIPS 140-2. {{es}} has been tested with a specific configuration described below. However, there are other configurations possible to achieve compliance. -The following is a high-level overview of the required configuration: +Here is a high-level overview of the required configuration: * Use an externally installed Java installation. The JVM bundled with {{es}} is not configured for FIPS 140-2. * Install a FIPS certified security provider .jar file(s) in {{es}}'s `lib` directory. -* Configure Java to use a FIPS certified security provider ([see below](/deploy-manage/security/fips-140-2.md#java-security-provider)). -* Configure {{es}}'s security manager to allow use of the FIPS certified provider ([see below](/deploy-manage/security/fips-140-2.md#java-security-manager)). -* Ensure the keystore and truststore are configured correctly ([see below](/deploy-manage/security/fips-140-2.md#keystore-fips-password)). -* Ensure the TLS settings are configured correctly ([see below](/deploy-manage/security/fips-140-2.md#fips-tls)). -* Ensure the password hashing settings are configured correctly ([see below](/deploy-manage/security/fips-140-2.md#fips-stored-password-hashing)). -* Ensure the cached password hashing settings are configured correctly ([see below](/deploy-manage/security/fips-140-2.md#fips-cached-password-hashing)). -* Configure `elasticsearch.yml` to use FIPS 140-2 mode, see ([below](/deploy-manage/security/fips-140-2.md#configuring-es-yml)). -* Verify the security provider is installed and configured correctly ([see below](/deploy-manage/security/fips-140-2.md#verify-security-provider)). -* Review the upgrade considerations ([see below](/deploy-manage/security/fips-140-2.md#fips-upgrade-considerations)) and limitations ([see below](/deploy-manage/security/fips-140-2.md#fips-limitations)). +* Configure Java to use a FIPS certified security provider ([see below](#java-security-provider)). +* Configure {{es}}'s security manager to allow use of the FIPS certified provider ([see below](#java-security-manager)). +* Ensure the keystore and truststore are configured correctly ([see below](#keystore-fips-password)). +* Ensure the TLS settings are configured correctly ([see below](#fips-tls)). +* Ensure the password hashing settings are configured correctly ([see below](#fips-stored-password-hashing)). +* Ensure the cached password hashing settings are configured correctly ([see below](#fips-cached-password-hashing)). +* Configure `elasticsearch.yml` to use FIPS 140-2 mode, see ([below](#configuring-es-yml)). +* Verify the security provider is installed and configured correctly ([see below](#verify-security-provider)). +* Review the upgrade considerations ([see below](#fips-upgrade-considerations)) and limitations ([see below](#fips-limitations)). -#### Java security provider [java-security-provider] +### Java security provider [java-security-provider] Detailed instructions for installation and configuration of a FIPS certified Java security provider is beyond the scope of this document. Specifically, a FIPS certified [JCA](https://docs.oracle.com/en/java/javase/17/security/java-cryptography-architecture-jca-reference-guide.html) and [JSSE](https://docs.oracle.com/en/java/javase/17/security/java-secure-socket-extension-jsse-reference-guide.html) implementation is required so that the JVM uses FIPS validated implementations of NIST recommended cryptographic algorithms. @@ -84,19 +52,19 @@ Detailed instructions for installation and configuration of a FIPS certified Jav To configure {{es}} to use additional security provider(s) configure {{es}}'s [JVM property](elasticsearch://reference/elasticsearch/jvm-settings.md#set-jvm-options) `java.security.properties` to point to a file ([example](https://raw.githubusercontent.com/elastic/elasticsearch/main/build-tools-internal/src/main/resources/fips_java.security)) in {{es}}'s `config` directory. Ensure the FIPS certified security provider is configured with the lowest order. This file should contain the necessary configuration to instruct Java to use the FIPS certified security provider. -#### Java security manager [java-security-manager] +### Java security manager [java-security-manager] All code running in {{es}} is subject to the security restrictions enforced by the Java security manager. The security provider you have installed and configured may require additional permissions in order to function correctly. You can grant these permissions by providing your own [Java security policy](https://docs.oracle.com/javase/8/docs/technotes/guides/security/PolicyFiles.md#FileSyntax) To configure {{es}}'s security manager configure the JVM property `java.security.policy` to point a file ([example](https://raw.githubusercontent.com/elastic/elasticsearch/main/build-tools-internal/src/main/resources/fips_java.policy))in {{es}}'s `config` directory with the desired permissions. This file should contain the necessary configuration for the Java security manager to grant the required permissions needed by the security provider. -#### {{es}} Keystore [keystore-fips-password] +### {{es}} Keystore [keystore-fips-password] FIPS 140-2 (via NIST Special Publication 800-132) dictates that encryption keys should at least have an effective strength of 112 bits. As such, the {{es}} keystore that stores the node’s [secure settings](/deploy-manage/security/secure-settings.md) needs to be password protected with a password that satisfies this requirement. This means that the password needs to be 14 bytes long which is equivalent to a 14 character ASCII encoded password, or a 7 character UTF-8 encoded password. You can use the [elasticsearch-keystore passwd](elasticsearch://reference/elasticsearch/command-line-tools/elasticsearch-keystore.md) subcommand to change or set the password of an existing keystore. Note that when the keystore is password-protected, you must supply the password each time {{es}} starts. -#### TLS [fips-tls] +### TLS [fips-tls] SSLv2 and SSLv3 are not allowed by FIPS 140-2, so `SSLv2Hello` and `SSLv3` cannot be used for [`ssl.supported_protocols`](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#ssl-tls-settings). @@ -106,13 +74,13 @@ The use of TLS ciphers is mainly governed by the relevant crypto module (the FIP -#### TLS keystores and keys [_tls_keystores_and_keys] +### TLS keystores and keys [_tls_keystores_and_keys] Keystores can be used in a number of [General TLS settings](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#ssl-tls-settings) in order to conveniently store key and trust material. Neither `JKS`, nor `PKCS#12` keystores can be used in a FIPS 140-2 configured JVM. Avoid using these types of keystores. Your FIPS 140-2 provider may provide a compliant keystore implementation that can be used, or you can use PEM encoded files. To use PEM encoded key material, you can use the relevant `\*.key` and `*.certificate` configuration options, and for trust material you can use `*.certificate_authorities`. FIPS 140-2 compliance dictates that the length of the public keys used for TLS must correspond to the strength of the symmetric key algorithm in use in TLS. Depending on the value of `ssl.cipher_suites` that you select to use, the TLS keys must have corresponding length according to the following table: -$$$comparable-key-strength$$$ +#### Comparable key strength [comparable-key-strength] | Symmetric Key Algorithm | RSA key Length | ECC key length | | --- | --- | --- | @@ -121,10 +89,9 @@ $$$comparable-key-strength$$$ | `AES-256` | 15630 | 512+ | -#### Stored password hashing [_stored_password_hashing] +### Stored password hashing [fips-stored-password-hashing] -$$$fips-stored-password-hashing$$$ -While {{es}} offers a number of algorithms for securely hashing credentials on disk, only the `PBKDF2` based family of algorithms is compliant with FIPS 140-2 for stored password hashing. However, since `PBKDF2` is essentially a key derivation function, your JVM security provider may enforce a [112-bit key strength requirement](/deploy-manage/security/fips-140-2.md#keystore-fips-password). Although FIPS 140-2 does not mandate user password standards, this requirement may affect password hashing in {{es}}. To comply with this requirement, while allowing you to use passwords that satisfy your security policy, {{es}} offers [pbkdf2_stretch](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#hashing-settings) which is the suggested hashing algorithm when running {{es}} in FIPS 140-2 environments. `pbkdf2_stretch` performs a single round of SHA-512 on the user password before passing it to the `PBKDF2` implementation. +While {{es}} offers a number of algorithms for securely hashing credentials on disk, only the `PBKDF2` based family of algorithms is compliant with FIPS 140-2 for stored password hashing. However, since `PBKDF2` is essentially a key derivation function, your JVM security provider may enforce a [112-bit key strength requirement](#keystore-fips-password). Although FIPS 140-2 does not mandate user password standards, this requirement may affect password hashing in {{es}}. To comply with this requirement, while allowing you to use passwords that satisfy your security policy, {{es}} offers [pbkdf2_stretch](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#hashing-settings) which is the suggested hashing algorithm when running {{es}} in FIPS 140-2 environments. `pbkdf2_stretch` performs a single round of SHA-512 on the user password before passing it to the `PBKDF2` implementation. ::::{note} You can still use one of the plain `pbkdf2` options instead of `pbkdf2_stretch` if you have external policies and tools that can ensure all user passwords for the reserved, native, and file realms are longer than 14 bytes. @@ -136,9 +103,8 @@ You must set the `xpack.security.authc.password_hashing.algorithm` setting to on Password hashing configuration changes are not retroactive so the stored hashed credentials of existing users of the reserved, native, and file realms are not updated on disk. To ensure FIPS 140-2 compliance, recreate users or change their password using the [elasticsearch-user](elasticsearch://reference/elasticsearch/command-line-tools/users-command.md) CLI tool for the file realm and the [create users](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-put-user) and [change password](https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-security-change-password) APIs for the native and reserved realms. Other types of realms are not affected and do not require any changes. -#### Cached password hashing [_cached_password_hashing] +### Cached password hashing [fips-cached-password-hashing] -$$$fips-cached-password-hashing$$$ `ssha256` (salted `sha256`) is recommended for cache hashing. Though `PBKDF2` is compliant with FIPS-140-2, it is — by design — slow, and thus not generally suitable as a cache hashing algorithm. Cached credentials are never stored on disk, and salted `sha256` provides an adequate level of security for in-memory credential hashing, without imposing prohibitive performance overhead. You *may* use `PBKDF2`, however you should carefully assess performance impact first. Depending on your deployment, the overhead of `PBKDF2` could undo most of the performance gain of using a cache. Either set all `cache.hash_algo` settings to `ssha256` or leave them undefined, since `ssha256` is the default value for all `cache.hash_algo` settings. See [User cache and password hash algorithms](elasticsearch://reference/elasticsearch/configuration-reference/security-settings.md#hashing-settings). @@ -146,13 +112,13 @@ Either set all `cache.hash_algo` settings to `ssha256` or leave them undefined, The user cache will be emptied upon node restart, so any existing hashes using non-compliant algorithms will be discarded and the new ones will be created using the algorithm you have selected. -#### Configure {{es}} elasticsearch.yml [configuring-es-yml] +### Configure {{es}} elasticsearch.yml [configuring-es-yml] * Set `xpack.security.fips_mode.enabled` to `true` in [`elasticsearch.yml`](/deploy-manage/stack-settings.md). This setting is used to ensure to configure some internal configuration to be FIPS 140-2 compliant and provides some additional verification. * Set `xpack.security.autoconfiguration.enabled` to `false`. This will disable the automatic configuration of the security settings. Users must ensure that the security settings are configured correctly for FIPS-140-2 compliance. This is only applicable for new installations. -* Set `xpack.security.authc.password_hashing.algorithm` appropriately see [above](/deploy-manage/security/fips-140-2.md#fips-stored-password-hashing). +* Set `xpack.security.authc.password_hashing.algorithm` appropriately see [above](#fips-stored-password-hashing). * Other relevant security settings. For example, TLS for the transport and HTTP interfaces. (not explicitly covered here or in the example below) -* Optional: Set `xpack.security.fips_mode.required_providers` in [`elasticsearch.yml`](/deploy-manage/stack-settings.md) to ensure the required security providers (8.13+). see [below](/deploy-manage/security/fips-140-2.md#verify-security-provider). +* Optional: Set `xpack.security.fips_mode.required_providers` in [`elasticsearch.yml`](/deploy-manage/stack-settings.md) to ensure the required security providers (8.13+). see [below](#verify-security-provider). ```yaml xpack.security.fips_mode.enabled: true @@ -162,7 +128,7 @@ xpack.security.authc.password_hashing.algorithm: "pbkdf2_stretch" ``` -#### Verify the security provider is installed [verify-security-provider] +### Verify the security provider is installed [verify-security-provider] To verify that the security provider is installed and in use, you can use any of the following steps: @@ -170,27 +136,26 @@ To verify that the security provider is installed and in use, you can use any of * Set `xpack.security.fips_mode.required_providers` in [`elasticsearch.yml`](/deploy-manage/stack-settings.md) to the list of required security providers. This setting is used to ensure that the correct security provider is installed and configured. (8.13+) If the security provider is not installed correctly, {{es}} will fail to start. `["BCFIPS", "BCJSSE"]` are the values to use for Bouncy Castle’s FIPS JCE and JSSE certified provider. -### Upgrade considerations [fips-upgrade-considerations] +## Upgrade considerations [fips-upgrade-considerations] {{es}} 8.0+ requires Java 17 or later. {{es}} 8.13+ has been tested with [Bouncy Castle](https://www.bouncycastle.org/java.html)'s Java 17 [certified](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4616) FIPS implementation and is the recommended Java security provider when running {{es}} in FIPS 140-2 mode. Note - {{es}} does not ship with a FIPS certified security provider and requires explicit installation and configuration. Alternatively, consider using {{ech}} in the [FedRAMP-certified GovCloud region](https://www.elastic.co/industries/public-sector/fedramp). -::::{important} +:::{important} Some encryption algorithms may no longer be available by default in updated FIPS 140-2 security providers. Notably, Triple DES and PKCS1.5 RSA are now discouraged and [Bouncy Castle](https://www.bouncycastle.org/fips-java) now requires explicit configuration to continue using these algorithms. - -:::: +::: If you plan to upgrade your existing cluster to a version that can be run in a FIPS 140-2 configured JVM, we recommend to first perform a rolling upgrade to the new version in your existing JVM and perform all necessary configuration changes in preparation for running in FIPS 140-2 mode. You can then perform a rolling restart of the nodes, starting each node in a FIPS 140-2 JVM. During the restart, {{es}}: -* Upgrades [secure settings](/deploy-manage/security/secure-settings.md) to the latest, compliant format. A FIPS 140-2 JVM cannot load previous format versions. If your keystore is not password-protected, you must manually set a password. See [{{es}} Keystore](/deploy-manage/security/fips-140-2.md#keystore-fips-password). +* Upgrades [secure settings](/deploy-manage/security/secure-settings.md) to the latest, compliant format. A FIPS 140-2 JVM cannot load previous format versions. If your keystore is not password-protected, you must manually set a password. See [{{es}} Keystore](#keystore-fips-password). * Upgrades self-generated trial licenses to the latest FIPS 140-2 compliant format. If your [subscription](https://www.elastic.co/subscriptions) already supports FIPS 140-2 mode, you can elect to perform a rolling upgrade while at the same time running each upgraded node in a FIPS 140-2 JVM. In this case, you would need to also manually regenerate your `elasticsearch.keystore` and migrate all secure settings to it, in addition to the necessary configuration changes outlined below, before starting each node. -### Limitations [fips-limitations] +## Limitations [fips-limitations] Due to the limitations that FIPS 140-2 compliance enforces, a small number of features are not available while running in FIPS 140-2 mode. The list is as follows: @@ -198,42 +163,3 @@ Due to the limitations that FIPS 140-2 compliance enforces, a small number of fe * The [`elasticsearch-certutil`](elasticsearch://reference/elasticsearch/command-line-tools/certutil.md) tool. However, `elasticsearch-certutil` can very well be used in a non FIPS 140-2 configured JVM (pointing `ES_JAVA_HOME` environment variable to a different java installation) in order to generate the keys and certificates that can be later used in the FIPS 140-2 configured JVM. * The SQL CLI client cannot run in a FIPS 140-2 configured JVM while using TLS for transport security or PKI for client authentication. - - -## {{kib}} [fips-kibana] - -To run {{kib}} in FIPS mode, you must have the appropriate [subscription](https://www.elastic.co/subscriptions). - -::::{important} -The Node bundled with {{kib}} is not configured for FIPS 140-2. You must configure a FIPS 140-2 compliant OpenSSL3 provider. Consult the Node.js documentation to learn how to configure your environment. - -:::: - - -For {{kib}}, adherence to FIPS 140-2 is ensured by: - -* Using FIPS approved / NIST recommended cryptographic algorithms. -* Delegating the implementation of these cryptographic algorithms to a NIST validated cryptographic module (available via Node.js configured with an OpenSSL3 provider). -* Allowing the configuration of {{kib}} in a FIPS 140-2 compliant manner, as documented below. - -### Configuring {{kib}} for FIPS 140-2 [_configuring_kib_for_fips_140_2] - -Apart from setting `xpack.security.fipsMode.enabled` to `true` in your {{kib}} config, a number of security related settings need to be reviewed and configured in order to run {{kib}} successfully in a FIPS 140-2 compliant Node.js environment. - -#### {{kib}} keystore [_kibana_keystore] - -FIPS 140-2 (via NIST Special Publication 800-132) dictates that encryption keys should at least have an effective strength of 112 bits. As such, the {{kib}} keystore that stores the application’s secure settings needs to be password protected with a password that satisfies this requirement. This means that the password needs to be 14 bytes long which is equivalent to a 14 character ASCII encoded password, or a 7 character UTF-8 encoded password. - -For more information on how to set this password, refer to the [keystore documentation](/deploy-manage/security/secure-settings.md#change-password). - - -#### TLS keystore and keys [_tls_keystore_and_keys] - -Keystores can be used in a number of General TLS settings in order to conveniently store key and trust material. PKCS#12 keystores cannot be used in a FIPS 140-2 compliant Node.js environment. Avoid using these types of keystores. Your FIPS 140-2 provider may provide a compliant keystore implementation that can be used, or you can use PEM encoded files. To use PEM encoded key material, you can use the relevant `\*.key` and `*.certificate` configuration options, and for trust material you can use `*.certificate_authorities`. - -As an example, avoid PKCS#12 specific settings such as: - -* `server.ssl.keystore.path` -* `server.ssl.truststore.path` -* `elasticsearch.ssl.keystore.path` -* `elasticsearch.ssl.truststore.path` \ No newline at end of file diff --git a/deploy-manage/security/fips-ingest.md b/deploy-manage/security/fips-ingest.md new file mode 100644 index 0000000000..9e9274f99c --- /dev/null +++ b/deploy-manage/security/fips-ingest.md @@ -0,0 +1,97 @@ +--- +applies_to: + deployment: ga +navigation_title: +products: + - id: apm + - id: elastic-agent + - id: beats + - id: fleet +applies_to: + stack: preview 9.1 + +--- + +# FIPS mode for Ingest tools [fips-ingest] + +{{agent}}, {{fleet}}, {{filebeat}}, {{metricbeat}}, and {{apm-server}} binaries are built and can be configured to use FIPS 140-2 compliant cryptography. +Generally speaking FIPS 140-2 requirements can be summarized as: +- linking against a FIPS certified cryptographic library +- using only FIPS approved cryptographic functions +- ensuring that the configuration of the component is FIPS 140-2 compliant. + +## FIPS-compatible binaries and configuration [fips-binaries] + +FIPS compatible binaries for {{agent}}, {{fleet}}, {{filebeat}}, {{metricbeat}}, and {{apm-server}} are available for [download](https://www.elastic.co/downloads). Look for the `Linux 64-bit (FIPS)` or `Linux aarch64 (FIPS)` platform option on the product download pages for {{agent}} and {{fleet}}, {{filebeat}}, and {{metricbeat}}. Look for the `Linux x86_64 (FIPS)` or `Linux aarch64 (FIPS)` platform option on the {{apm-server}} download page. + +:::{important} +The default configurations provided in the binaries are FIPS compatible. Be sure to check and understand the implications of changing default configurations. +::: + +## Limitations [ingest-limitations-all] + +### TLS [ingest-limitations-tls] + +Only FIPS 140-2 compliant TLS protocols, ciphers, and curve types are allowed to be used as listed below. +* The supported TLS versions are `TLS v1.2` and `TLS v1.3`. +* The supported cipher suites are: + * `TLS v1.2`: `ECDHE-RSA-AES-128-GCM-SHA256`, `ECDHE-RSA-AES-256-GCM-SHA384`, `ECDHE-ECDSA-AES-128-GCM-SHA256`, `ECDHE-ECDSA-AES-256-GCM-SHA384` + * `TLS v1.3`: `TLS-AES-128-GCM-SHA256`, `TLS-AES-256-GCM-SHA384` +* The supported curve types are `P-256`, `P-384` and `P-521`. + +Support for encrypted private keys is not available, as the cryptographic modules used for decrypting password protected keys are not FIPS validated. If an output or any other component with an SSL key that is password protected is configured, the components will fail to load the key. When running in FIPS mode, you must provide non-encrypted keys. +Be sure to enforce security in your FIPS environments through other means, such as strict file permissions and access controls on the key file itself, for example. + +These TLS related restrictions apply to all components listed--{{agent}}, {{fleet}}, {{filebeat}}, {{metricbeat}}, and {{apm-server}}. + +### General output and input limitations (Kerberos protocol) [ingest-inputoutput-limitations] + +The Kerberos protocol is not supported for any output or input, which also impacts the available `sasl.mechanism` for the Kafka output where only `PLAIN` is supported. + +This impacts [Filebeat](beats://reference/filebeat/configuration-kerberos.md), [Metricbeat](beats://reference/metricbeat/configuration-kerberos.md) and {{apm-server}}, as well as output configurations for {{agent}} with {{fleet-server}}. + + +### APM Server [ingest-apm-limitations] + +* The [Secrets Keystore](/solutions/observability/apm/secrets-keystore-for-secure-settings.md) is not supported. + +### Filebeat [ingest-filebeat-limitations] + +* The [Secrets Keystore](beats://reference/filebeat/keystore.md) is not supported. +* The [Translate GUID processor](beats://reference/filebeat/processor-translate-guid.md) is not supported. +* The [Fingerprint processor](beats://reference/filebeat/fingerprint.md) does not support the md5 and sha1 method. +* The [Community ID Network Flowhash processor](beats://reference/filebeat/community-id.md) is not supported. +* The [Azure module](beats://reference/filebeat/filebeat-module-azure.md) including the [Azure eventhub input](beats://reference/filebeat/filebeat-input-azure-eventhub.md) and the [Azure Blob Storage Input](https://www.elastic.co/docs/reference/beats/filebeat/filebeat-input-azure-blob-storage) are not currently supported. The [Add Cloud Metadata processor](beats://reference/filebeat/add-cloud-metadata.md) does not support the Azure Virtual Machine provider currently. +* The [Office 365 module (Beta)](beats://reference/filebeat/filebeat-module-o365.md) and the [Office 365 input (Deprecated)](https://www.elastic.co/docs/reference/beats/filebeat/filebeat-input-o365audit) are not supported. +* The [GCP Pub/Sub input](beats://reference/filebeat/filebeat-input-gcp-pubsub.md) and the [Google Cloud Storage input](https://www.elastic.co/docs/reference/beats/filebeat/filebeat-input-gcs) are not supported for now. +* The [Entity Analytics input](https://www.elastic.co/docs/reference/beats/filebeat/filebeat-input-entity-analytics) is not supported. + +### Metricbeat [ingest-metricbeat-limitations] + +* The [Secrets Keystore](beats://reference/metricbeat/keystore.md) is not supported. +* The [Translate GUID processor](beats://reference/metricbeat/processor-translate-guid.md) is not supported. +* The [Fingerprint processor](beats://reference/metricbeat/fingerprint.md) does not support the md5 and sha1 method. +* The [Community ID Network Flowhash processor](beats://reference/metricbeat/community-id.md) is not supported. +* The [Azure module](beats://reference/metricbeat/metricbeat-module-azure.md) is currently not supported. The [Add Cloud Metadata processor](beats://reference/metricbeat/add-cloud-metadata.md) does not support the Azure Virtual Machine provider currently. +* The [Google Cloud Platform module](https://www.elastic.co/docs/reference/beats/metricbeat/metricbeat-module-gcp) is currently not supported. +* The [Beta KVM module](beats://reference/metricbeat/metricbeat-module-kvm.md) is not yet supported. +* The [Mongo DB module](beats://reference/metricbeat/metricbeat-module-mongodb.md) is not supported. +* The [MySQL](beats://reference/metricbeat/metricbeat-module-mysql.md), [PostgreSQL](beats://reference/metricbeat/metricbeat-module-postgresql.md), [MSSQL](beats://reference/metricbeat/metricbeat-module-mssql.md) and [SQL](beats://reference/metricbeat/metricbeat-module-sql.md) modules are not supported. +* The [Oracle module](beats://reference/metricbeat/metricbeat-module-oracle.md) is not supported. + +### Elastic Agent and Fleet Server [ingest-limitations-agent] + +When you use {{agent}} and {{fleet-server}}, these limitations apply: +* Running {{agent}} in [OpenTelemetry mode](https://github.com/elastic/elastic-agent/blob/main/internal/pkg/otel/README.md) is not yet supported. This includes all receivers, such as Filebeat Receiver, Metricbeat Receiver, [Prometheus Receiver](https://www.elastic.co/docs/reference/integrations/prometheus). +* Some Elastic Integrations are not FIPS compatible, as they depend on functionality that is not yet supported for FIPS configuration. In general, when using {{agent}} and {{fleet-server}}, the same restrictions listed previously for {{metricbeat}} and {{filebeat}} modules, inputs, and processors apply. + + These Elastic Integrations have components that are **not** FIPS compatible, and **cannot** be used in FIPS environments, even if combined with other ingest tools that offer FIPS mode. + + - [Azure Logs Integration (v2 preview)](integration-docs://reference/azure/events.md) + - [Azure Event Hub Input](integration-docs://reference/azure/eventhub.md) + - [PostgreSQL Integration](integration-docs://reference/postgresql.md) + - [MongoDB Integration](integration-docs://reference/mongodb.md) + - [MySQL Integration](integration-docs://reference/mysql.md) + - [Microsoft SQL Server Integration](integration-docs://reference/microsoft_sqlserver.md) + - [Oracle Integration](integration-docs://reference/oracle.md) + diff --git a/deploy-manage/security/fips-kib.md b/deploy-manage/security/fips-kib.md new file mode 100644 index 0000000000..a48398b338 --- /dev/null +++ b/deploy-manage/security/fips-kib.md @@ -0,0 +1,45 @@ +--- +applies_to: + deployment: + self: ga +products: + - id: kibana +--- + +# FIPS compliance for {{kib}} [fips-kibana] + +To run {{kib}} in FIPS mode, you must have the appropriate [subscription](https://www.elastic.co/subscriptions). + +::::{important} +The Node bundled with {{kib}} is not configured for FIPS 140-2. You must configure a FIPS 140-2 compliant OpenSSL3 provider. Consult the Node.js documentation to learn how to configure your environment. + +:::: + + +For {{kib}}, adherence to FIPS 140-2 is ensured by: + +* Using FIPS approved / NIST recommended cryptographic algorithms. +* Delegating the implementation of these cryptographic algorithms to a NIST validated cryptographic module (available via Node.js configured with an OpenSSL3 provider). +* Allowing the configuration of {{kib}} in a FIPS 140-2 compliant manner, as documented below. + +## Configuring {{kib}} for FIPS 140-2 [_configuring_kib_for_fips_140_2] + +Apart from setting `xpack.security.fipsMode.enabled` to `true` in your {{kib}} config, a number of security related settings need to be reviewed and configured in order to run {{kib}} successfully in a FIPS 140-2 compliant Node.js environment. + +### {{kib}} keystore [_kibana_keystore] + +FIPS 140-2 (via NIST Special Publication 800-132) dictates that encryption keys should at least have an effective strength of 112 bits. As such, the {{kib}} keystore that stores the application’s secure settings needs to be password protected with a password that satisfies this requirement. This means that the password needs to be 14 bytes long which is equivalent to a 14 character ASCII encoded password, or a 7 character UTF-8 encoded password. + +For more information on how to set this password, refer to the [keystore documentation](/deploy-manage/security/secure-settings.md#change-password). + + +### TLS keystore and keys [_tls_keystore_and_keys] + +Keystores can be used in a number of General TLS settings in order to conveniently store key and trust material. PKCS#12 keystores cannot be used in a FIPS 140-2 compliant Node.js environment. Avoid using these types of keystores. Your FIPS 140-2 provider may provide a compliant keystore implementation that can be used, or you can use PEM encoded files. To use PEM encoded key material, you can use the relevant `\*.key` and `*.certificate` configuration options, and for trust material you can use `*.certificate_authorities`. + +As an example, avoid PKCS#12 specific settings such as: + +* `server.ssl.keystore.path` +* `server.ssl.truststore.path` +* `elasticsearch.ssl.keystore.path` +* `elasticsearch.ssl.truststore.path` \ No newline at end of file diff --git a/deploy-manage/security/fips.md b/deploy-manage/security/fips.md new file mode 100644 index 0000000000..996d152f57 --- /dev/null +++ b/deploy-manage/security/fips.md @@ -0,0 +1,27 @@ +--- +mapped_pages: + - https://www.elastic.co/guide/en/elasticsearch/reference/current/fips-140-compliance.html + - https://www.elastic.co/guide/en/kibana/current/xpack-security-fips-140-2.html +applies_to: + deployment: + self: ga +products: + - id: elasticsearch + - id: kibana + - id: elastic-agent + - id: beats + - id: fleet + - id: apm +--- + +# FIPS 140-2 compliance + +The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), titled "Security Requirements for Cryptographic Modules" is a U.S. government computer security standard used to approve cryptographic modules. +- [{{es}}](/deploy-manage/security/fips-es.md) offers a FIPS 140-2 compliant mode and as such can run in a FIPS 140-2 configured JVM. +- [{{kib}}](/deploy-manage/security/fips-kib.md) offers a FIPS 140-2 compliant mode and as such can run in a Node.js environment configured with a FIPS 140-2 compliant OpenSSL3 provider. +- Some [Ingest tools](/deploy-manage/security/fips-ingest.md), including {{agent}}, {{fleet}}, {{filebeat}}, {{metricbeat}}, and {{apm-server}}, are available as FIPS compatible binaries and can be configured to use FIPS 140-2 compliant cryptography. + +:::{note} +If you are running {{es}} through {{eck}}, refer to [ECK FIPS compatibility](/deploy-manage/deploy/cloud-on-k8s/deploy-fips-compatible-version-of-eck.md). +::: + diff --git a/deploy-manage/security/secure-your-cluster-deployment.md b/deploy-manage/security/secure-your-cluster-deployment.md index f971825fb2..c8e22daf76 100644 --- a/deploy-manage/security/secure-your-cluster-deployment.md +++ b/deploy-manage/security/secure-your-cluster-deployment.md @@ -60,7 +60,7 @@ deployment: The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB 140-2), titled "Security Requirements for Cryptographic Modules" is a U.S. government computer security standard used to approve cryptographic modules. You can run a self-managed cluster or {{eck}} cluster in FIPS-compliant mode: -* [Self-managed](/deploy-manage/security/fips-140-2.md) +* [Self-managed](/deploy-manage/security/fips.md) * [ECK](/deploy-manage/deploy/cloud-on-k8s/deploy-fips-compatible-version-of-eck.md) % we need to refine this table, but the idea is awesome IMO diff --git a/deploy-manage/security/supported-ssltls-versions-by-jdk-version.md b/deploy-manage/security/supported-ssltls-versions-by-jdk-version.md index f2e2d03fa2..d85c1509f3 100644 --- a/deploy-manage/security/supported-ssltls-versions-by-jdk-version.md +++ b/deploy-manage/security/supported-ssltls-versions-by-jdk-version.md @@ -15,7 +15,7 @@ products: Different JDK versions support different versions of SSL, and this may affect how {{es}} operates. ::::{note} -This support applies when running on the default JSSE provider in the JDK. JVMs that are configured to use a [FIPS 140-2](fips-140-2.md) security provider might have a custom TLS implementation, which might support TLS protocol versions that differ from this list. +This support applies when running on the default JSSE provider in the JDK. JVMs that are configured to use a [FIPS 140-2](fips.md) security provider might have a custom TLS implementation, which might support TLS protocol versions that differ from this list. Check your security provider’s release notes for information on TLS support. diff --git a/deploy-manage/toc.yml b/deploy-manage/toc.yml index 49940796ec..e7db9aede7 100644 --- a/deploy-manage/toc.yml +++ b/deploy-manage/toc.yml @@ -520,10 +520,14 @@ toc: - file: security/logging-configuration/logfile-audit-output.md - file: security/logging-configuration/auditing-search-queries.md - file: security/logging-configuration/correlating-kibana-elasticsearch-audit-logs.md - - file: security/fips-140-2.md - file: security/secure-clients-integrations.md - file: security/httprest-clients-security.md - file: security/limitations.md + - file: security/fips.md + children: + - file: security/fips-es.md + - file: security/fips-kib.md + - file: security/fips-ingest.md - file: users-roles.md children: - file: users-roles/cloud-organization.md diff --git a/docset.yml b/docset.yml index 3853e8de40..d4f0e318dc 100644 --- a/docset.yml +++ b/docset.yml @@ -144,6 +144,7 @@ subs: kib: "Kibana" ls: "Logstash" beats: "Beats" + agentbeat: "Agentbeat" auditbeat: "Auditbeat" filebeat: "Filebeat" heartbeat: "Heartbeat" @@ -287,6 +288,7 @@ subs: release-date: "2-April-2025" heroku: "Elasticsearch Add-on for Heroku" obs-ai-assistant: "Elastic AI Assistant for Observability and Search" + apm-server: "APM Server" apm-server-or-mis: "APM Server or the managed intake service" apis: https://www.elastic.co/docs/api/ es-apis: https://www.elastic.co/docs/api/doc/elasticsearch/ diff --git a/redirects.yml b/redirects.yml index 277e403f2d..05de54063d 100644 --- a/redirects.yml +++ b/redirects.yml @@ -291,4 +291,7 @@ redirects: 'explore-analyze/machine-learning/machine-learning-in-kibana/xpack-ml-anomalies.md': 'explore-analyze/machine-learning/anomaly-detection.md' 'explore-analyze/machine-learning/machine-learning-in-kibana/xpack-ml-dfa-analytics.md': 'explore-analyze/machine-learning/data-frame-analytics.md' - 'solutions/search/retrievers-examples.md': 'elasticsearch://reference/elasticsearch/rest-apis/retrievers/retrievers-examples.md' \ No newline at end of file + 'solutions/search/retrievers-examples.md': 'elasticsearch://reference/elasticsearch/rest-apis/retrievers/retrievers-examples.md' + +# Related to https://github.com/elastic/docs-content/pull/2136 + 'deploy-manage/security/fips-140-2.md': 'deploy-manage/security/fips.md' \ No newline at end of file