You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
8. In case of fresh installation, update the repository and install the most recent version of the NGINX Plus App Protect DoS package (which includes NGINX Plus):
437
+
9. In case of fresh installation, update the repository and install the most recent version of the NGINX Plus App Protect DoS package (which includes NGINX Plus):
432
438
433
439
```shell
434
440
sudo dnf install app-protect-dos
@@ -457,7 +463,7 @@ When deploying App Protect DoS on NGINX Plus take the following precautions to s
457
463
sudo dnf install app-protect-dos-27+2.4.0
458
464
```
459
465
460
-
9. In case of upgrading from previously installed NGINX Plus App Protect DoS package (which includes NGINX Plus):
466
+
10. In case of upgrading from previously installed NGINX Plus App Protect DoS package (which includes NGINX Plus):
461
467
462
468
```shell
463
469
sudo dnf remove nginx-plus
@@ -621,14 +627,20 @@ When deploying App Protect DoS on NGINX Plus take the following precautions to s
621
627
622
628
6. Enable the yum repositories to pull NGINX App Protect DoS dependencies:
Copy file name to clipboardExpand all lines: content/nginx/fips-compliance-nginx-plus.md
+33-27Lines changed: 33 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,36 +24,42 @@ Some industries such as finance, healthcare, energy, also adopt FIPS to enhance
24
24
25
25
Currently, both FIPS 140-2 and FIPS 140-3 certifications are accepted. However, FIPS 140-2 is being phased out as part of the [FIPS 140-3 transition plan](https://csrc.nist.gov/projects/fips-140-3-transition-effort). After September 22, 2026, only FIPS 140-3 certifications will be recognized. Organizations are encouraged to migrate to FIPS 140-3 to meet updated cryptographic security requirements.
| State and Local Gov Programs | 140-2 or 140-3 | Mandatory |
56
+
{{< /table >}}
51
57
52
58
### FIPS compliance in other countries
53
59
54
60
Although FIPS 140 is primarily a North American government cryptographic standard, it is widely recognized as a global benchmark for cryptographic security. Numerous countries outside North America align their cryptographic requirements with FIPS, especially in regulated sectors such as finance, defense, healthcare, and critical infrastructure.
| Australia | Referenced for government, defense, and cryptography systems. |
@@ -74,7 +80,7 @@ Although FIPS 140 is primarily a North American government cryptographic standar
74
80
| UAE | Trusted in finance, energy, and interoperability with the U.S. cryptography.|
75
81
| United Kingdom | Referenced for defense, health, and procurement standards. |
76
82
| United States | Mandatory for federal government systems and contractors. |
77
-
{{< /bootstrap-table >}}
83
+
{{< /table >}}
78
84
79
85
## FIPS compliant vs FIPS validated
80
86
@@ -129,7 +135,7 @@ The process uses Red Hat Enterprise Linux (RHEL) release 9.6 as an example and c
129
135
130
136
### Step 1: Configure the operating system to use FIPS mode {#os-fips-setup}
131
137
132
-
For the purposes of the following demonstration, we installed and configured a RHEL 9.6 server. The [Red Hat FIPS documentation](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/chap-federal_standards_and_regulations#sec-Enabling-FIPS-Mode) explains how to switch the operating system between FIPS mode and non‑FIPS mode by editing the boot options and restarting the system.
138
+
For the purposes of the following demonstration, we installed and configured a RHEL 9.6 server. The [Red Hat FIPS documentation](https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/switching-rhel-to-fips-mode_security-hardening) explains how to switch the operating system between FIPS mode and non‑FIPS mode by editing the boot options and restarting the system.
133
139
134
140
For instructions for enabling FIPS mode on other FIPS‑compliant Linux operating systems, see the operating system documentation, for example:
Copy file name to clipboardExpand all lines: content/nginxaas-azure/changelog.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,17 @@ To see a list of currently active issues, visit the [Known issues]({{< ref "/ngi
14
14
To review older entries, visit the [Changelog archive]({{< ref "/nginxaas-azure/changelog-archive" >}}) section.
15
15
16
16
17
+
## September 18, 2025
18
+
19
+
- {{% icon-feature %}} **Notification on update to deployments using the Stable Upgrade Channel**
20
+
21
+
NGINXaaS for Azure deployments using the **Stable**[Upgrade Channel]({{< ref "/nginxaas-azure/quickstart/upgrade-channels.md" >}}) will be updated to [NGINX Plus Release 35 (R35)]({{< ref "/nginx/releases.md#nginxplusrelease-35-r35" >}}) during the week of Oct 06-10, 2025. This will also include updates to the following NGINX Plus modules:
22
+
- nginx-plus-module-njs
23
+
24
+
Please review the [NGINX Plus Release 35 (R35)]({{< ref "/nginx/releases.md#nginxplusrelease-35-r35" >}}) Release Notes carefully. If you have any concerns, it's recommended to validate your configuration against NGINX Plus R35 by setting up a test deployment using the **Preview**[Upgrade Channel]({{< ref "/nginxaas-azure/quickstart/upgrade-channels.md" >}}). See [these instructions]({{< ref "/nginxaas-azure/quickstart/recreate.md" >}}) on how to set up a deployment similar to your current one.
25
+
26
+
If you have any questions or concerns, please [contact us]({{< ref "/nginxaas-azure/get-help.md" >}}).
27
+
17
28
## August 18, 2025
18
29
19
30
- {{% icon-feature %}} **Updates to NGINXaaS for Azure GitHub Action**
Copy file name to clipboardExpand all lines: content/nginxaas-azure/getting-started/nginx-configuration/overview.md
+13-10Lines changed: 13 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,17 +25,20 @@ The topics below provide information on NGINX configuration restrictions and dir
25
25
NGINX configurations stored in GitHub can be applied to existing NGINXaaS for Azure deployments using custom GitHub Action workflows. See [NGINXaaS for Azure Deployment Action](https://github.com/nginxinc/nginx-for-azure-deploy-action) for documentation and examples on how to incorporate these workflows in your GitHub Actions CI/CD pipelines.
26
26
27
27
## NGINX filesystem restrictions
28
-
NGINXaaS for Azure places restrictions on the instance's filesystem; only a specific set of directories are allowed to be read from and written to. Below is a table describing what directories the NGINX worker process can read and write to and what directories files can be written to. These files include certificate files and any files uploaded to the deployment, excluding NGINX configuration files.
29
28
30
-
{{< table >}}
31
-
| Allowed Directory | NGINX worker process can read/write to | Files can be written to |
NGINXaaS for Azure places restrictions on the instance’s filesystem; only a specific set of directories are allowed to be read from and written to. Below is a table describing what directories the NGINX worker process can read and write to and what directories files can be written to. These files include certificate files and any files uploaded to the deployment, excluding NGINX configuration files.
| nginx-plus-module-appprotect | 35+5.498.0-1 | NGINX Plus app protect dynamic module version 5.498.0 |
30
+
| app-protect-module-plus | 35+5.498.0-1 | App-Protect package for Nginx Plus, includes all of the default files and examples. NGINX App Protect provides web application firewall (WAF) security protection for your web applications, including OWASP Top 10 attacks. |
Copy file name to clipboardExpand all lines: content/nic/configuration/policy-resource.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -793,29 +793,6 @@ The feature is implemented using the NGINX [ngx_http_proxy_module](https://nginx
793
793
794
794
A VirtualServer/VirtualServerRoute can reference multiple cache policies. However, only one can be applied: every subsequent reference will be ignored.
795
795
796
-
## Using Policy
797
-
798
-
You can use the usual `kubectl` commands to work with Policy resources, just as with built-in Kubernetes resources.
799
-
800
-
For example, the following command creates a Policy resource defined in `access-control-policy-allow.yaml` with the name `webapp-policy`:
801
-
802
-
```shell
803
-
kubectl apply -f access-control-policy-allow.yaml
804
-
805
-
policy.k8s.nginx.org/webapp-policy configured
806
-
```
807
-
808
-
You can get the resource by running:
809
-
810
-
```shell
811
-
kubectl get policy webapp-policy
812
-
813
-
NAME AGE
814
-
webapp-policy 27m
815
-
```
816
-
817
-
For `kubectl get` and similar commands, you can also use the short name `pol` instead of `policy`.
818
-
819
796
### WAF
820
797
821
798
{{< call-out "note" >}} The feature is implemented using the NGINX Plus [NGINX App Protect WAF Module]({{< ref "/nap-waf/" >}}). {{< /call-out >}}
@@ -863,6 +840,29 @@ policies:
863
840
864
841
In this example NGINX Ingress Controller will use the configuration from the first policy reference `waf-policy-one`, and ignores `waf-policy-two`.
865
842
843
+
## Using Policy
844
+
845
+
You can use the usual `kubectl` commands to work with Policy resources, just as with built-in Kubernetes resources.
846
+
847
+
For example, the following command creates a Policy resource defined in `access-control-policy-allow.yaml` with the name `webapp-policy`:
848
+
849
+
```shell
850
+
kubectl apply -f access-control-policy-allow.yaml
851
+
852
+
policy.k8s.nginx.org/webapp-policy configured
853
+
```
854
+
855
+
You can get the resource by running:
856
+
857
+
```shell
858
+
kubectl get policy webapp-policy
859
+
860
+
NAME AGE
861
+
webapp-policy 27m
862
+
```
863
+
864
+
For `kubectl get` and similar commands, you can also use the short name `pol` instead of `policy`.
865
+
866
866
### Applying Policies
867
867
868
868
You can apply policies to both VirtualServer and VirtualServerRoute resources. For example:
0 commit comments