[ 
https://issues.apache.org/jira/browse/HDDS-10236?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

István Fajth deleted HDDS-10236:
--------------------------------


> Cryptography compliance with FIPS/FISMA (US regulations)
> --------------------------------------------------------
>
>                 Key: HDDS-10236
>                 URL: https://issues.apache.org/jira/browse/HDDS-10236
>             Project: Apache Ozone
>          Issue Type: Improvement
>            Reporter: István Fajth
>            Assignee: István Fajth
>            Priority: Major
>
> FIPS stands for Federal Information Processing Standards, defined by the 
> National Institute of Standards and Technology (NIST).
> The current version is [FIPS 140 - 
> 3|https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf], which is based 
> on the ISO/IEC 19790, and it overwrites some points of the ISO standard.
> There is a series of modifications under NIST SP 800-140 from A to F as 
> follows:
> [A: documentation 
> requirements|https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140A.pdf]
>  (related to compliance certification)
> [B: security policy 
> requirements|https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Br1.pdf]
>  (related to what to define in policies)
> [C: approved security 
> functions|https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Cr2.pdf]
>  (lists compliant security functions)
> [D: approved sensitive security parameter generation and establishment 
> methods|https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140Dr2.pdf]
>  (defines approved methods for key/security parameter generation)
> [E: approved authentication 
> mechanisms|https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140E.pdf]
>  (approved auth mechanisms at certain security levels)
> [F: approved non-invasive attack mitigation test 
> metricshttps://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-140F.pdf]
>  (no addition to the ISO standard)
> Unfortunately the ISO/IEC 19970 is behind a paywall, but based on FIPS 
> 140-3's description it is highly influenced by FIPS 140-2, so the approach we 
> can easily take for the first steps is to have the first set of requirements 
> based on FIPS 140-2 and understand the differences of 140-3 based on the NIST 
> overrides and the standard itself.
> The main area of focus as a starting point is to work on the security 
> functions and parameter generation related questions, then check 
> authentication related questions, the rest does not seem to be applicable to 
> the actual software itself.
> It is not part of the scope to actually bring Apache Ozone through the FIPS 
> certification process at the moment.
> It is not a goal to make Ozone FIPS compliant by default, the aim is to 
> enable it to be compliant with the FIPS regulations, either via plugging in 
> things that are not compliant and with that enable to plug-in the compliant 
> version also, or make it available to easily rule out the usage of 
> non-compliant things via configuration, without changing the default 
> behaviour.
> FISMA/FIPS 140-2 defines four security levels, from lowest to highest 
> security requirements, then discusses in great details the required physical, 
> electrical, mechanical, personal, and organisational aspects of the 
> requirements for the different security levels, in addition to this it 
> defines requirements for certain processes, like authentication, key 
> management, configuration management, and testing, last but not least, 
> operational requirements, development related questions and guidances are 
> also taking place in the standard.
> From Ozone's perspective the significant parts are related to the 
> used/allowed cryptographic algorithms, the used random sources, how we 
> generate and store keys, and other cryptography parameters, and what checks 
> we implement at startup to ensure the integrity of our cryptographic assets 
> we manage, and/or use.
> In an upcoming design document I will post as a PR for this JIRA, I am 
> summarising the details about the current and desired state in our codebase 
> needed to be compliant with FIPS rules, and the path to get there.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to