fips-140-compliance.asciidoc 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277
  1. [role="xpack"]
  2. [[fips-140-compliance]]
  3. === FIPS 140-2
  4. The Federal Information Processing Standard (FIPS) Publication 140-2, (FIPS PUB
  5. 140-2), titled "Security Requirements for Cryptographic Modules" is a U.S.
  6. government computer security standard used to approve cryptographic modules.
  7. {es} offers a FIPS 140-2 compliant mode and as such can run in a FIPS 140-2
  8. configured JVM.
  9. IMPORTANT: The JVM bundled with {es} is not configured for FIPS 140-2. You must
  10. configure an external JDK with a FIPS 140-2 certified Java Security Provider.
  11. Refer to the {es}
  12. https://www.elastic.co/support/matrix#matrix_jvm[JVM support matrix] for
  13. supported JVM configurations. See https://www.elastic.co/subscriptions[subscriptions] for required licensing.
  14. Compliance with FIPS 140-2 requires using only FIPS approved / NIST recommended cryptographic algorithms. Generally this can be done by the following:
  15. - Installation and configuration of a FIPS certified Java security provider.
  16. - Ensuring the configuration of {es} is FIPS 140-2 compliant as documented below.
  17. - Setting `xpack.security.fips_mode.enabled` to `true` in `elasticsearch.yml`. Note - this setting alone is not sufficient to be compliant
  18. with FIPS 140-2.
  19. [discrete]
  20. === Configuring {es} for FIPS 140-2
  21. Detailed instructions for the configuration required for FIPS 140-2 compliance is beyond the scope of this document. It is the responsibility
  22. of the user to ensure compliance with FIPS 140-2. {es} has been tested with a specific configuration described below. However, there are
  23. other configurations possible to achieve compliance.
  24. The following is a high-level overview of the required configuration:
  25. * Use an externally installed Java installation. The JVM bundled with {es} is not configured for FIPS 140-2.
  26. * Install a FIPS certified security provider .jar file(s) in {es}'s `lib` directory.
  27. * Configure Java to use a FIPS certified security provider (xref:java-security-provider[see below]).
  28. * Configure {es}'s security manager to allow use of the FIPS certified provider (xref:java-security-manager[see below]).
  29. * Ensure the keystore and truststore are configured correctly (xref:keystore-fips-password[see below]).
  30. * Ensure the TLS settings are configured correctly (xref:fips-tls[see below]).
  31. * Ensure the password hashing settings are configured correctly (xref:fips-stored-password-hashing[see below]).
  32. * Ensure the cached password hashing settings are configured correctly (xref:fips-cached-password-hashing[see below]).
  33. * Configure `elasticsearch.yml` to use FIPS 140-2 mode, see (xref:configuring-es-yml[below]).
  34. * Verify the security provider is installed and configured correctly (xref:verify-security-provider[see below]).
  35. * Review the upgrade considerations (xref:fips-upgrade-considerations[see below]) and limitations (xref:fips-limitations[see below]).
  36. [discrete]
  37. [[java-security-provider]]
  38. ==== Java security provider
  39. Detailed instructions for installation and configuration of a FIPS certified Java security provider is beyond the scope of this document.
  40. Specifically, a FIPS certified
  41. https://docs.oracle.com/en/java/javase/17/security/java-cryptography-architecture-jca-reference-guide.html[JCA] and
  42. https://docs.oracle.com/en/java/javase/17/security/java-secure-socket-extension-jsse-reference-guide.html[JSSE] implementation is required
  43. so that the JVM uses FIPS validated implementations of NIST recommended cryptographic algorithms.
  44. Elasticsearch has been tested with Bouncy Castle's https://repo1.maven.org/maven2/org/bouncycastle/bc-fips/1.0.2.4/bc-fips-1.0.2.4.jar[bc-fips 1.0.2.4]
  45. and https://repo1.maven.org/maven2/org/bouncycastle/bctls-fips/1.0.17/bctls-fips-1.0.17.jar[bctls-fips 1.0.17].
  46. Please refer to the {es}
  47. https://www.elastic.co/support/matrix#matrix_jvm[JVM support matrix] for details on which combinations of JVM and security provider are supported in FIPS mode. Elasticsearch does not ship with a FIPS certified provider. It is the responsibility of the user
  48. to install and configure the security provider to ensure compliance with FIPS 140-2. Using a FIPS certified provider will ensure that only
  49. approved cryptographic algorithms are used.
  50. To configure {es} to use additional security provider(s) configure {es}'s <<set-jvm-options, JVM property>> `java.security.properties` to point to a file
  51. (https://raw.githubusercontent.com/elastic/elasticsearch/main/build-tools-internal/src/main/resources/fips_java.security[example]) in {es}'s
  52. `config` directory. Ensure the FIPS certified security provider is configured with the lowest order. This file should contain the necessary
  53. configuration to instruct Java to use the FIPS certified security provider.
  54. [discrete]
  55. [[java-security-manager]]
  56. ==== Java security manager
  57. All code running in {es} is subject to the security restrictions enforced by the Java security manager.
  58. The security provider you have installed and configured may require additional permissions in order to function correctly. You can grant these permissions by providing your own
  59. https://docs.oracle.com/javase/8/docs/technotes/guides/security/PolicyFiles.html#FileSyntax[Java security policy]
  60. To configure {es}'s security manager configure the JVM property `java.security.policy` to point a file
  61. (https://raw.githubusercontent.com/elastic/elasticsearch/main/build-tools-internal/src/main/resources/fips_java.policy[example])in {es}'s
  62. `config` directory with the desired permissions. This file should contain the necessary configuration for the Java security manager
  63. to grant the required permissions needed by the security provider.
  64. [discrete]
  65. [[keystore-fips-password]]
  66. ==== {es} Keystore
  67. FIPS 140-2 (via NIST Special Publication 800-132) dictates that encryption keys should at
  68. least have an effective strength of 112 bits.
  69. As such, the {es} keystore that stores the node's <<secure-settings,secure settings>>
  70. needs to be password protected with a password that satisfies this requirement.
  71. This means that the password needs to be 14 bytes long which is equivalent
  72. to a 14 character ASCII encoded password, or a 7 character UTF-8 encoded password.
  73. You can use the <<elasticsearch-keystore, elasticsearch-keystore passwd>> subcommand to change or set the
  74. password of an existing keystore.
  75. Note that when the keystore is password-protected, you must supply the password each time
  76. Elasticsearch starts.
  77. [discrete]
  78. [[fips-tls]]
  79. ==== TLS
  80. SSLv2 and SSLv3 are not allowed by FIPS 140-2, so `SSLv2Hello` and `SSLv3` cannot
  81. be used for <<ssl-tls-settings,`ssl.supported_protocols`>>.
  82. NOTE: The use of TLS ciphers is mainly governed by the relevant crypto module
  83. (the FIPS Approved Security Provider that your JVM uses). All the ciphers that
  84. are configured by default in {es} are FIPS 140-2 compliant and as such can be
  85. used in a FIPS 140-2 JVM. See <<ssl-tls-settings,`ssl.cipher_suites`>>.
  86. [discrete]
  87. ==== TLS keystores and keys
  88. Keystores can be used in a number of <<ssl-tls-settings>> in order to
  89. conveniently store key and trust material. Neither `JKS`, nor `PKCS#12` keystores
  90. can be used in a FIPS 140-2 configured JVM. Avoid using
  91. these types of keystores. Your FIPS 140-2 provider may provide a compliant keystore
  92. implementation that can be used, or you can use PEM encoded files. To use PEM encoded
  93. key material, you can use the relevant `\*.key` and `*.certificate` configuration
  94. options, and for trust material you can use `*.certificate_authorities`.
  95. FIPS 140-2 compliance dictates that the length of the public keys used for TLS
  96. must correspond to the strength of the symmetric key algorithm in use in TLS.
  97. Depending on the value of `ssl.cipher_suites` that you select to use, the TLS
  98. keys must have corresponding length according to the following table:
  99. [[comparable-key-strength]]
  100. .Comparable key strengths
  101. |=======================
  102. | Symmetric Key Algorithm | RSA key Length | ECC key length
  103. | `3DES` | 2048 | 224-255
  104. | `AES-128` | 3072 | 256-383
  105. | `AES-256` | 15630 | 512+
  106. |=======================
  107. [discrete]
  108. ==== Stored password hashing
  109. [[fips-stored-password-hashing]]
  110. While {es} offers a number of algorithms for securely hashing credentials
  111. on disk, only the `PBKDF2` based family of algorithms is compliant with FIPS
  112. 140-2 for stored password hashing. However, since `PBKDF2` is essentially a key derivation
  113. function, your JVM security provider may enforce a
  114. <<keystore-fips-password,112-bit key strength requirement>>. Although FIPS 140-2
  115. does not mandate user password standards, this requirement may affect password
  116. hashing in {es}. To comply with this requirement,
  117. while allowing you to use passwords that satisfy your security policy, {es} offers
  118. <<hashing-settings, pbkdf2_stretch>> which is the suggested hashing algorithm when running
  119. {es} in FIPS 140-2 environments. `pbkdf2_stretch` performs a single round of SHA-512
  120. on the user password before passing it to the `PBKDF2` implementation.
  121. NOTE: You can still use one of the plain `pbkdf2` options instead of `pbkdf2_stretch` if
  122. you have external policies and tools that can ensure all user passwords for the reserved,
  123. native, and file realms are longer than 14 bytes.
  124. You must set the `xpack.security.authc.password_hashing.algorithm` setting to one of the
  125. available `pbkdf_stretch_*` values.
  126. When FIPS-140 mode is enabled, the default value for
  127. `xpack.security.authc.password_hashing.algorithm` is `pbkdf2_stretch`.
  128. See <<hashing-settings>>.
  129. Password hashing configuration changes are not retroactive so the stored hashed
  130. credentials of existing users of the reserved, native, and file realms are not
  131. updated on disk.
  132. To ensure FIPS 140-2 compliance, recreate users or
  133. change their password using the <<users-command, elasticsearch-user>> CLI tool
  134. for the file realm and the <<security-api-put-user,create users>> and
  135. <<security-api-change-password,change password>> APIs for the native and reserved realms.
  136. Other types of realms are not affected and do not require any changes.
  137. [discrete]
  138. ==== Cached password hashing
  139. [[fips-cached-password-hashing]]
  140. `ssha256` (salted `sha256`) is recommended for cache hashing. Though
  141. `PBKDF2` is compliant with FIPS-140-2, it is -- by design -- slow, and
  142. thus not generally suitable as a cache hashing algorithm. Cached
  143. credentials are never stored on disk, and salted `sha256` provides an
  144. adequate level of security for in-memory credential hashing, without
  145. imposing prohibitive performance overhead. You _may_ use `PBKDF2`,
  146. however you should carefully assess performance impact first. Depending
  147. on your deployment, the overhead of `PBKDF2` could undo most of the
  148. performance gain of using a cache.
  149. Either set all `cache.hash_algo` settings to `ssha256` or leave
  150. them undefined, since `ssha256` is the default value for all
  151. `cache.hash_algo` settings. See <<hashing-settings>>.
  152. The user cache will be emptied upon node restart, so any existing
  153. hashes using non-compliant algorithms will be discarded and the new
  154. ones will be created using the algorithm you have selected.
  155. [discrete]
  156. [[configuring-es-yml]]
  157. ==== Configure {es} elasticsearch.yml
  158. * Set `xpack.security.fips_mode.enabled` to `true` in `elasticsearch.yml`. This setting is used to ensure to configure some internal
  159. configuration to be FIPS 140-2 compliant and provides some additional verification.
  160. * Set `xpack.security.autoconfiguration.enabled` to `false`. This will disable the automatic configuration of the security settings.
  161. Users must ensure that the security settings are configured correctly for FIPS-140-2 compliance. This is only applicable for new installations.
  162. * Set `xpack.security.authc.password_hashing.algorithm` appropriately see xref:fips-stored-password-hashing[above].
  163. * Other relevant security settings. For example, TLS for the transport and HTTP interfaces. (not explicitly covered here or in the example below)
  164. * Optional: Set `xpack.security.fips_mode.required_providers` in `elasticsearch.yml` to ensure the required security providers (8.13+).
  165. see xref:verify-security-provider[below].
  166. [source,yaml]
  167. --------------------------------------------------
  168. xpack.security.fips_mode.enabled: true
  169. xpack.security.autoconfiguration.enabled: false
  170. xpack.security.fips_mode.required_providers: ["BCFIPS", "BCJSSE"]
  171. xpack.security.authc.password_hashing.algorithm: "pbkdf2_stretch"
  172. --------------------------------------------------
  173. [discrete]
  174. [[verify-security-provider]]
  175. ==== Verify the security provider is installed
  176. To verify that the security provider is installed and in use, you can use any of the following steps:
  177. * Verify the required security providers are configured with the lowest order in the file pointed to by `java.security.properties`.
  178. For example, `security.provider.1` is a lower order than `security.provider.2`
  179. * Set `xpack.security.fips_mode.required_providers` in `elasticsearch.yml` to the list of required security providers.
  180. This setting is used to ensure that the correct security provider is installed and configured. (8.13+)
  181. If the security provider is not installed correctly, {es} will fail to start. `["BCFIPS", "BCJSSE"]` are the values to
  182. use for Bouncy Castle's FIPS JCE and JSSE certified provider.
  183. [discrete]
  184. [[fips-upgrade-considerations]]
  185. === Upgrade considerations
  186. include::fips-java17.asciidoc[]
  187. [IMPORTANT]
  188. ====
  189. Some encryption algorithms may no longer be available by default in updated FIPS 140-2 security providers.
  190. Notably, Triple DES and PKCS1.5 RSA are now discouraged and https://www.bouncycastle.org/fips-java[Bouncy Castle] now
  191. requires explicit configuration to continue using these algorithms.
  192. ====
  193. If you plan to upgrade your existing cluster to a version that can be run in
  194. a FIPS 140-2 configured JVM, we recommend to first perform a rolling
  195. upgrade to the new version in your existing JVM and perform all necessary
  196. configuration changes in preparation for running in FIPS 140-2 mode. You can then
  197. perform a rolling restart of the nodes, starting each node in a FIPS 140-2 JVM.
  198. During the restart, {es}:
  199. - Upgrades <<secure-settings,secure settings>> to the latest, compliant format.
  200. A FIPS 140-2 JVM cannot load previous format versions. If your keystore is
  201. not password-protected, you must manually set a password. See
  202. <<keystore-fips-password>>.
  203. - Upgrades self-generated trial licenses to the latest FIPS 140-2 compliant format.
  204. If your {subscriptions}[subscription] already supports FIPS 140-2 mode, you
  205. can elect to perform a rolling upgrade while at the same time running each
  206. upgraded node in a FIPS 140-2 JVM. In this case, you would need to also manually
  207. regenerate your `elasticsearch.keystore` and migrate all secure settings to it,
  208. in addition to the necessary configuration changes outlined below, before
  209. starting each node.
  210. [discrete]
  211. [[fips-limitations]]
  212. === Limitations
  213. Due to the limitations that FIPS 140-2 compliance enforces, a small number of
  214. features are not available while running in FIPS 140-2 mode. The list is as follows:
  215. * Azure Classic Discovery Plugin
  216. * The <<certutil,`elasticsearch-certutil`>> tool. However,
  217. `elasticsearch-certutil` can very well be used in a non FIPS 140-2
  218. configured JVM (pointing `ES_JAVA_HOME` environment variable to a different
  219. java installation) in order to generate the keys and certificates that
  220. can be later used in the FIPS 140-2 configured JVM.
  221. * The SQL CLI client cannot run in a FIPS 140-2 configured JVM while using
  222. TLS for transport security or PKI for client authentication.