|
1 | 1 | ---
|
2 |
| -title: "FIPS Tyk Release" |
| 2 | +title: "Tyk FIPS Policy" |
3 | 3 | date: 2024-07-25
|
4 | 4 | tags: ["FAQ", "FIPS Releases", "Special Release - FIPS"]
|
5 | 5 | description: "Explain what FIPS Release means, what it includes, and what to expect"
|
6 | 6 | aliases:
|
7 | 7 | - /developer-support/special-releases-and-features/fips-release
|
8 | 8 | ---
|
9 | 9 |
|
10 |
| -The Federal Information Processing Standards (FIPS) are a series of cryptography and hashing standards defined by the U.S. |
11 |
| -Federal Government's National Institute of Standards and Technology (NIST). These standards are crucial for organizations dealing with sensitive |
12 |
| -government data and are widely recognized as a benchmark for security in various regulated industries. |
| 10 | +## What is FIPS |
13 | 11 |
|
14 |
| -FIPS compliance is important for industries such as: |
15 |
| -- Government and military |
16 |
| -- Healthcare |
17 |
| -- Finance |
18 |
| -- Critical infrastructure |
| 12 | +The [Federal Information Processing Standards](https://csrc.nist.gov/glossary/term/federal_information_processing_standard) (FIPS) are U.S. government standards for cryptographic modules, defined by the [National Institute of Standards and Technology](https://www.nist.gov) (NIST). |
19 | 13 |
|
20 |
| -### Importance of FIPS Compliance in API Management |
| 14 | +The most relevant standard for API management is **[FIPS 140-2](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf)**, which specifies how cryptographic modules must be designed and validated. |
21 | 15 |
|
22 |
| -FIPS compliance is particularly important in API management for several reasons: |
| 16 | +FIPS compliance is often required for organizations in: |
23 | 17 |
|
24 |
| -1. **Security of Data in Transit:** API management often involves handling sensitive data as it moves between clients |
25 |
| -and backend services. FIPS compliance ensures that this data is encrypted using approved, robust cryptographic |
26 |
| -algorithms. |
27 |
| -2. **Authentication and Authorization:** API gateways typically handle user authentication and authorization. |
28 |
| -FIPS-compliant cryptographic modules ensure these processes are performed securely, using approved methods for key |
29 |
| -generation, storage, and cryptographic operations. |
30 |
| -3. **Regulatory Compliance:** For organizations working with U.S. government agencies or in regulated industries, using |
31 |
| -a FIPS-compliant API management solution can be a requirement to meet regulatory standards. |
32 |
| -4. **Key Management:** API keys and other secrets used in API management need to be securely generated, stored, and |
33 |
| -managed. FIPS provides standards for these cryptographic operations. |
34 |
| -5. **SSL/TLS Implementation:** API gateways often terminate SSL/TLS connections. FIPS compliance ensures that these |
35 |
| -connections use approved protocols and cipher suites. |
36 |
| -6. **Logging and Auditing:** FIPS compliance can extend to how API activity logs are stored and protected, which is a |
37 |
| -crucial part of API management. |
38 |
| -7. **Plugin and Extension Security:** For API management platforms that support plugins or extensions, FIPS compliance |
39 |
| -ensures that any cryptographic operations performed by these components also adhere to the required standards. |
40 |
| -8. **Identity Federation:** When API management platforms integrate with identity providers, FIPS compliance ensures |
41 |
| -that the cryptographic aspects of these integrations meet federal standards. |
| 18 | +* Government and defense |
| 19 | +* Healthcare and life sciences |
| 20 | +* Financial services |
| 21 | +* Critical infrastructure |
42 | 22 |
|
43 |
| -### FIPS 140-2 Overview |
| 23 | +For API management, FIPS matters because it ensures: |
44 | 24 |
|
45 |
| -[FIPS 140-2](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf) is a specific standard within the FIPS |
46 |
| -framework that focuses on the security of cryptographic modules. It defines four levels of security, from Level 1 |
47 |
| -(lowest) to Level 4 (highest), each building upon the security requirements of the previous level. These levels cover |
48 |
| -a wide range of potential applications and environments in which cryptographic modules may be employed. A cryptographic |
49 |
| -module, as defined by FIPS 140-2, is a set of hardware, software, firmware, or some combination thereof that implements |
50 |
| -cryptographic functions or processes, including cryptographic algorithms and optional key generation, and is contained |
51 |
| -within a defined cryptographic boundary. |
| 25 | +* **Secure data in transit**: only strong, approved algorithms are used. |
52 | 26 |
|
53 |
| -FIPS 140-2 validation is performed by accredited [Cryptographic and Security Testing](https://csrc.nist.rip/Projects/cryptographic-module-validation-program/Standards#:~:text=FIPS%20140%2D2%20(effective%2015%2DNov%2D2001)&text=NVLAP%20accredited%20Cryptographic%20and%20Security,for%20Cryptographic%20Modules%20%5B%20PDF%20%5D.) |
54 |
| -(CST) laboratories. The validation covers various aspects of the cryptographic module, including Electromagnetic |
55 |
| -Interference/Electromagnetic Compatibility (EMI/EMC), Cryptographic Module Specification, and mitigation of Other Attacks. |
| 27 | +* **Robust authentication & key management**: cryptographic operations like token signing and API key hashing are performed using validated methods. |
56 | 28 |
|
57 |
| -### Tyk's FIPS Compliance |
| 29 | +* **Regulatory alignment**: supports compliance where FIPS 140-2 is mandated. |
58 | 30 |
|
59 |
| -We are pleased to announce that Tyk Gateway and Pump offer a FIPS compliant package (together, the *"FIPS Tyk |
60 |
| -Product”*). |
| 31 | +## Tyk’s FIPS Offering |
61 | 32 |
|
62 |
| -The *FIPS Tyk Product* has not been submitted to a [NIST](https://www.nist.gov/federal-information-processing-standards-fips) testing lab for validation. |
| 33 | +Tyk provides a **FIPS-compliant package** of the Tyk Gateway (Enterprise Edition) and Tyk Pump (together, the *FIPS Tyk Product*). Please note that the FIPS Tyk Product has not been submitted to a [NIST](https://www.nist.gov/federal-information-processing-standards-fips) testing lab for validation and Tyk is not FIPS certified.. |
63 | 34 |
|
64 |
| -*FIPS compliance* means that the *FIPS Tyk Product* only uses FIPS 140-2 approved cryptographic [algorithms]({{< ref "#fips-compliant-cryptographic-operations" >}}) |
65 |
| -while running in FIPS mode. This compliance applies only to specific Tyk-built packages or Docker images of the *FIPS Tyk Product*. |
66 |
| -These packages and images are not publicly accessible. Please speak to your assigned account manager for more information. |
| 35 | +**FIPS-compliant** means that the FIPS Tyk Product only uses FIPS 140-2 approved cryptographic algorithms (see below) when running in FIPS mode. This is only available to specific Tyk-built packages or Docker images of the FIPS Tyk Product. These packages and images are not publicly accessible. |
67 | 36 |
|
68 |
| -{{< note success >}} |
69 |
| -**Note** |
| 37 | +* The FIPS Tyk Product uses the **[BoringCrypto module](https://boringssl.googlesource.com/boringssl/+/master/crypto/fipsmodule/FIPS.md#fips-140_2)**, enabling only FIPS 140-2 approved algorithms when run in FIPS mode. |
70 | 38 |
|
71 |
| -Use of the <i>FIPS Tyk Product</i> is conditional on the user accepting any specific terms and conditions |
72 |
| -applicable to this feature and a paid license. Please contact your account manager if you would like further information. |
73 |
| -{{< /note >}} |
| 39 | +* These packages are distributed separately, identifiable by the `-fips` suffix (e.g., `tyk-gateway-fips`, `tyk-pump-fips`). |
74 | 40 |
|
75 |
| -#### FIPS Compliant Cryptographic Operations |
| 41 | +* The FIPS Tyk Product is available for selected enterprise-supported Linux distributions. Please [contact](https://tyk.io/contact/) your account manager for details. |
76 | 42 |
|
77 |
| -The *FIPS Tyk Product* uses the [BoringCrypto](https://boringssl.googlesource.com/boringssl/+/master/crypto/fipsmodule/FIPS.md#fips-140_2) module to provide FIPS 140-2 validated cryptographic operations. This ensures that when running in FIPS mode, only FIPS 140-2 approved algorithms are used. |
| 43 | +* The FIPS Tyk Product **has not been submitted to a NIST testing lab**. It is therefore *FIPS-compliant*, as per the above definition, and is not *FIPS-certified*. |
78 | 44 |
|
79 |
| -For more details on the cryptographic operations supported in Tyk's FIPS-compliant mode, please contact your Tyk account manager. |
| 45 | +* Compliance applies only to the binaries we ship as part of the FIPS Tyk Product only, not to the entire system or deployment environment or otherwise. Customers remain responsible for ensuring compliance with their overall deployment. |
80 | 46 |
|
81 |
| -### Configuring Tyk for FIPS Compliance |
| 47 | +## Configuring Tyk for FIPS Mode |
82 | 48 |
|
83 |
| -The *FIPS Tyk Product* packages are identifiable by the `-fips` suffix. E.g. `tyk-gateway-fips` or `tyk-pump-fips`. |
| 49 | +When running the FIPS Tyk Product in the Tyk Gateway, you must set the key hashing algorithm to SHA-256: |
84 | 50 |
|
85 |
| -The only change to configuration, when using the *FIPS Tyk Product*, is to set your key hashing algorithm to SHA256 either by setting `hash_key_function` in your Gateway configuration file (`tyk.conf`) or the `TYK_GW_HASHKEYFUNCTION` environment variable to the value: `sha256`. |
| 51 | +In `tyk.conf`: |
86 | 52 |
|
87 |
| -### Frequently Asked Questions |
| 53 | + `"hash_key_function": "sha256"` |
| 54 | +Or via environment variable: |
88 | 55 |
|
89 |
| -Q: What level of FIPS 140-2 compliance does Tyk support? |
| 56 | + `TYK_GW_HASHKEYFUNCTION=sha256` |
90 | 57 |
|
91 |
| -A: Tyk provides FIPS 140-2 compliance, ensuring the use of approved algorithms in FIPS mode. |
| 58 | +When using FIPS mode for Tyk Pump, you do not need to set this algorithm. |
92 | 59 |
|
93 |
| -Q: Can I use Tyk in FIPS mode in the Tyk Cloud environment? |
| 60 | +## Important Note |
94 | 61 |
|
95 |
| -A: Yes but only for hybrid gateways deployed on your premises and connecting to the Tyk Cloud control plane. |
| 62 | +Use of the FIPS Tyk Product is conditional upon: |
96 | 63 |
|
97 |
| -Q: Does FIPS mode affect Tyk's performance? |
| 64 | +* A paid enterprise license agreement. |
| 65 | +* Acceptance of any additional terms specific to FIPS releases. |
98 | 66 |
|
99 |
| -A: There should be no material impact on performance from the use of FIPS mode. |
| 67 | +Please speak with your [Tyk account manager](https://tyk.io/contact/) for more information. |
100 | 68 |
|
101 |
| -### Additional Resources |
| 69 | +## FAQ |
102 | 70 |
|
103 |
| -- [Official NIST FIPS 140-2 documentation](https://csrc.nist.gov/publications/detail/fips/140/2/final) |
| 71 | +<details> <summary><b>What level of FIPS 140-2 compliance does Tyk support?</b></summary> |
104 | 72 |
|
105 |
| -For more information on FIPS compliance in Tyk, please contact your account manager or {{< button_left href="https://tyk.io/contact/" color="green" content="Contact us" >}}. |
| 73 | +Tyk provides compliance by ensuring that in FIPS mode, only FIPS 140-2 approved algorithms are used. The Tyk FIPS Product is not FIPS-certified. |
| 74 | + |
| 75 | +</details> |
| 76 | + |
| 77 | +<details> <summary><b>Can I use Tyk in FIPS mode in the Tyk Cloud environment?</b></summary> |
| 78 | + |
| 79 | +Yes, on the data plane with hybrid gateways using the Tyk FIPS product deployed on your premises that connect to the Tyk Cloud control plane. |
| 80 | + |
| 81 | +</details> |
| 82 | + |
| 83 | +<details> <summary><b>Does FIPS mode affect performance?</b></summary> |
| 84 | + |
| 85 | +There is no expected impact on performance. |
| 86 | + |
| 87 | +</details> |
| 88 | + |
| 89 | +<details> <summary><b>Are all Tyk components FIPS-compliant?</b></summary> |
| 90 | + |
| 91 | +Compliance applies only to the specific FIPS Tyk Product binaries. Other components, plugins, and integrations must be reviewed separately by customers for compliance. The Tyk FIPS Product is provided in certain Linux distributions. Docker images are also available containing these binaries, however Tyk does not claim FIPS compliance at the image level, only the binaries. |
| 92 | + |
| 93 | +</details> |
0 commit comments