Skip to content

Commit c268150

Browse files
authored
Merge master into custom-go-auth
2 parents 7974b08 + 7ba48d4 commit c268150

File tree

1 file changed

+56
-68
lines changed

1 file changed

+56
-68
lines changed
Lines changed: 56 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -1,105 +1,93 @@
11
---
2-
title: "FIPS Tyk Release"
2+
title: "Tyk FIPS Policy"
33
date: 2024-07-25
44
tags: ["FAQ", "FIPS Releases", "Special Release - FIPS"]
55
description: "Explain what FIPS Release means, what it includes, and what to expect"
66
aliases:
77
- /developer-support/special-releases-and-features/fips-release
88
---
99

10-
The Federal Information Processing Standards (FIPS) are a series of cryptography and hashing standards defined by the U.S.
11-
Federal Government's National Institute of Standards and Technology (NIST). These standards are crucial for organizations dealing with sensitive
12-
government data and are widely recognized as a benchmark for security in various regulated industries.
10+
## What is FIPS
1311

14-
FIPS compliance is important for industries such as:
15-
- Government and military
16-
- Healthcare
17-
- Finance
18-
- Critical infrastructure
12+
The [Federal Information Processing Standards](https://csrc.nist.gov/glossary/term/federal_information_processing_standard) (FIPS) are U.S. government standards for cryptographic modules, defined by the [National Institute of Standards and Technology](https://www.nist.gov) (NIST).
1913

20-
### Importance of FIPS Compliance in API Management
14+
The most relevant standard for API management is **[FIPS 140-2](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf)**, which specifies how cryptographic modules must be designed and validated.
2115

22-
FIPS compliance is particularly important in API management for several reasons:
16+
FIPS compliance is often required for organizations in:
2317

24-
1. **Security of Data in Transit:** API management often involves handling sensitive data as it moves between clients
25-
and backend services. FIPS compliance ensures that this data is encrypted using approved, robust cryptographic
26-
algorithms.
27-
2. **Authentication and Authorization:** API gateways typically handle user authentication and authorization.
28-
FIPS-compliant cryptographic modules ensure these processes are performed securely, using approved methods for key
29-
generation, storage, and cryptographic operations.
30-
3. **Regulatory Compliance:** For organizations working with U.S. government agencies or in regulated industries, using
31-
a FIPS-compliant API management solution can be a requirement to meet regulatory standards.
32-
4. **Key Management:** API keys and other secrets used in API management need to be securely generated, stored, and
33-
managed. FIPS provides standards for these cryptographic operations.
34-
5. **SSL/TLS Implementation:** API gateways often terminate SSL/TLS connections. FIPS compliance ensures that these
35-
connections use approved protocols and cipher suites.
36-
6. **Logging and Auditing:** FIPS compliance can extend to how API activity logs are stored and protected, which is a
37-
crucial part of API management.
38-
7. **Plugin and Extension Security:** For API management platforms that support plugins or extensions, FIPS compliance
39-
ensures that any cryptographic operations performed by these components also adhere to the required standards.
40-
8. **Identity Federation:** When API management platforms integrate with identity providers, FIPS compliance ensures
41-
that the cryptographic aspects of these integrations meet federal standards.
18+
* Government and defense
19+
* Healthcare and life sciences
20+
* Financial services
21+
* Critical infrastructure
4222

43-
### FIPS 140-2 Overview
23+
For API management, FIPS matters because it ensures:
4424

45-
[FIPS 140-2](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf) is a specific standard within the FIPS
46-
framework that focuses on the security of cryptographic modules. It defines four levels of security, from Level 1
47-
(lowest) to Level 4 (highest), each building upon the security requirements of the previous level. These levels cover
48-
a wide range of potential applications and environments in which cryptographic modules may be employed. A cryptographic
49-
module, as defined by FIPS 140-2, is a set of hardware, software, firmware, or some combination thereof that implements
50-
cryptographic functions or processes, including cryptographic algorithms and optional key generation, and is contained
51-
within a defined cryptographic boundary.
25+
* **Secure data in transit**: only strong, approved algorithms are used.
5226

53-
FIPS 140-2 validation is performed by accredited [Cryptographic and Security Testing](https://csrc.nist.rip/Projects/cryptographic-module-validation-program/Standards#:~:text=FIPS%20140%2D2%20(effective%2015%2DNov%2D2001)&text=NVLAP%20accredited%20Cryptographic%20and%20Security,for%20Cryptographic%20Modules%20%5B%20PDF%20%5D.)
54-
(CST) laboratories. The validation covers various aspects of the cryptographic module, including Electromagnetic
55-
Interference/Electromagnetic Compatibility (EMI/EMC), Cryptographic Module Specification, and mitigation of Other Attacks.
27+
* **Robust authentication & key management**: cryptographic operations like token signing and API key hashing are performed using validated methods.
5628

57-
### Tyk's FIPS Compliance
29+
* **Regulatory alignment**: supports compliance where FIPS 140-2 is mandated.
5830

59-
We are pleased to announce that Tyk Gateway and Pump offer a FIPS compliant package (together, the *"FIPS Tyk
60-
Product”*).
31+
## Tyk’s FIPS Offering
6132

62-
The *FIPS Tyk Product* has not been submitted to a [NIST](https://www.nist.gov/federal-information-processing-standards-fips) testing lab for validation.
33+
Tyk provides a **FIPS-compliant package** of the Tyk Gateway (Enterprise Edition) and Tyk Pump (together, the *FIPS Tyk Product*). Please note that the FIPS Tyk Product has not been submitted to a [NIST](https://www.nist.gov/federal-information-processing-standards-fips) testing lab for validation and Tyk is not FIPS certified..
6334

64-
*FIPS compliance* means that the *FIPS Tyk Product* only uses FIPS 140-2 approved cryptographic [algorithms]({{< ref "#fips-compliant-cryptographic-operations" >}})
65-
while running in FIPS mode. This compliance applies only to specific Tyk-built packages or Docker images of the *FIPS Tyk Product*.
66-
These packages and images are not publicly accessible. Please speak to your assigned account manager for more information.
35+
**FIPS-compliant** means that the FIPS Tyk Product only uses FIPS 140-2 approved cryptographic algorithms (see below) when running in FIPS mode. This is only available to specific Tyk-built packages or Docker images of the FIPS Tyk Product. These packages and images are not publicly accessible.
6736

68-
{{< note success >}}
69-
**Note**
37+
* The FIPS Tyk Product uses the **[BoringCrypto module](https://boringssl.googlesource.com/boringssl/+/master/crypto/fipsmodule/FIPS.md#fips-140_2)**, enabling only FIPS 140-2 approved algorithms when run in FIPS mode.
7038

71-
Use of the <i>FIPS Tyk Product</i> is conditional on the user accepting any specific terms and conditions
72-
applicable to this feature and a paid license. Please contact your account manager if you would like further information.
73-
{{< /note >}}
39+
* These packages are distributed separately, identifiable by the `-fips` suffix (e.g., `tyk-gateway-fips`, `tyk-pump-fips`).
7440

75-
#### FIPS Compliant Cryptographic Operations
41+
* The FIPS Tyk Product is available for selected enterprise-supported Linux distributions. Please [contact](https://tyk.io/contact/) your account manager for details.
7642

77-
The *FIPS Tyk Product* uses the [BoringCrypto](https://boringssl.googlesource.com/boringssl/+/master/crypto/fipsmodule/FIPS.md#fips-140_2) module to provide FIPS 140-2 validated cryptographic operations. This ensures that when running in FIPS mode, only FIPS 140-2 approved algorithms are used.
43+
* The FIPS Tyk Product **has not been submitted to a NIST testing lab**. It is therefore *FIPS-compliant*, as per the above definition, and is not *FIPS-certified*.
7844

79-
For more details on the cryptographic operations supported in Tyk's FIPS-compliant mode, please contact your Tyk account manager.
45+
* Compliance applies only to the binaries we ship as part of the FIPS Tyk Product only, not to the entire system or deployment environment or otherwise. Customers remain responsible for ensuring compliance with their overall deployment.
8046

81-
### Configuring Tyk for FIPS Compliance
47+
## Configuring Tyk for FIPS Mode
8248

83-
The *FIPS Tyk Product* packages are identifiable by the `-fips` suffix. E.g. `tyk-gateway-fips` or `tyk-pump-fips`.
49+
When running the FIPS Tyk Product in the Tyk Gateway, you must set the key hashing algorithm to SHA-256:
8450

85-
The only change to configuration, when using the *FIPS Tyk Product*, is to set your key hashing algorithm to SHA256 either by setting `hash_key_function` in your Gateway configuration file (`tyk.conf`) or the `TYK_GW_HASHKEYFUNCTION` environment variable to the value: `sha256`.
51+
In `tyk.conf`:
8652

87-
### Frequently Asked Questions
53+
`"hash_key_function": "sha256"`
54+
Or via environment variable:
8855

89-
Q: What level of FIPS 140-2 compliance does Tyk support?
56+
`TYK_GW_HASHKEYFUNCTION=sha256`
9057

91-
A: Tyk provides FIPS 140-2 compliance, ensuring the use of approved algorithms in FIPS mode.
58+
When using FIPS mode for Tyk Pump, you do not need to set this algorithm.
9259

93-
Q: Can I use Tyk in FIPS mode in the Tyk Cloud environment?
60+
## Important Note
9461

95-
A: Yes but only for hybrid gateways deployed on your premises and connecting to the Tyk Cloud control plane.
62+
Use of the FIPS Tyk Product is conditional upon:
9663

97-
Q: Does FIPS mode affect Tyk's performance?
64+
* A paid enterprise license agreement.
65+
* Acceptance of any additional terms specific to FIPS releases.
9866

99-
A: There should be no material impact on performance from the use of FIPS mode.
67+
Please speak with your [Tyk account manager](https://tyk.io/contact/) for more information.
10068

101-
### Additional Resources
69+
## FAQ
10270

103-
- [Official NIST FIPS 140-2 documentation](https://csrc.nist.gov/publications/detail/fips/140/2/final)
71+
<details> <summary><b>What level of FIPS 140-2 compliance does Tyk support?</b></summary>
10472

105-
For more information on FIPS compliance in Tyk, please contact your account manager or {{< button_left href="https://tyk.io/contact/" color="green" content="Contact us" >}}.
73+
Tyk provides compliance by ensuring that in FIPS mode, only FIPS 140-2 approved algorithms are used. The Tyk FIPS Product is not FIPS-certified.
74+
75+
</details
76+
77+
<details> <summary><b>Can I use Tyk in FIPS mode in the Tyk Cloud environment?</b></summary>
78+
79+
Yes, on the data plane with hybrid gateways using the Tyk FIPS product deployed on your premises that connect to the Tyk Cloud control plane.
80+
81+
</details
82+
83+
<details> <summary><b>Does FIPS mode affect performance?</b></summary>
84+
85+
There is no expected impact on performance.
86+
87+
</details
88+
89+
<details> <summary><b>Are all Tyk components FIPS-compliant?</b></summary>
90+
91+
Compliance applies only to the specific FIPS Tyk Product binaries. Other components, plugins, and integrations must be reviewed separately by customers for compliance. The Tyk FIPS Product is provided in certain Linux distributions. Docker images are also available containing these binaries, however Tyk does not claim FIPS compliance at the image level, only the binaries.
92+
93+
</details

0 commit comments

Comments
 (0)