[ 
https://issues.apache.org/jira/browse/FLINK-35626?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Martijn Visser updated FLINK-35626:
-----------------------------------
    Priority: Not a Priority  (was: Minor)

> Add support for FIPS
> --------------------
>
>                 Key: FLINK-35626
>                 URL: https://issues.apache.org/jira/browse/FLINK-35626
>             Project: Flink
>          Issue Type: New Feature
>          Components: Documentation
>            Reporter: Mark
>            Priority: Not a Priority
>
> In order to be able to use Apache Flink in certain environments with strict 
> compliance requirements, the application may need to be compliant with 
> FIPS-140-2.
> The path to produce a FIPS complaint image can vary, depending on the 
> programming language and application itself. For Java, this may involve:
>  * For any bundled crypto, utilising FIPS versions, i.e the FIPS version of 
> BouncyCastle (bcfips). Alternatively, ensuring there is no bundled crypto, 
> and all operations fallback to the JRE / OpenSSL on the host
>  * Where keystores are required, support for creating bckfs keystore types
>  * Producing a base image with OpenSSL configured for FIPS, as well as a JRE 
> configured for FIPS (such as bcfips)
>  * No use of unapproved crypto algorithms, such as DES, MD5, SHA1 etc
> It would be great if Flink was able to support FIPS - by that, I mean 
> ensuring all requirements are met, and some documentation outlining how this 
> is met and enforced.
> From a quick scan of the codebase, I don't see any direct references to 
> bouncycastle (either non-fips or fips), but I do see several places where md5 
> and sha1 are used for example.
> Support for FIPS would increase the use-cases for deploying Flink in secure 
> environments. Thanks for taking this into consideration.
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to