|
| 1 | +documentation_complete: true |
| 2 | + |
| 3 | +title: 'Verify that the system was booted with fips=1' |
| 4 | + |
| 5 | +description: |- |
| 6 | + On a system where FIPS 14032 mode is enabled, the system must be booted with the |
| 7 | + <tt>fips=1</tt> kernel argument. |
| 8 | + To verify FIPS mode, run the following command: |
| 9 | + <pre>cat /proc/cmdline</pre> |
| 10 | +
|
| 11 | +rationale: |- |
| 12 | + Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to |
| 13 | + protect data. The operating system must implement cryptographic modules adhering to the higher |
| 14 | + standards approved by the federal government since this provides assurance they have been tested |
| 15 | + and validated. |
| 16 | +
|
| 17 | +severity: high |
| 18 | + |
| 19 | +identifiers: |
| 20 | + cce@rhel10: CCE-86247-4 |
| 21 | + |
| 22 | +references: |
| 23 | + disa: CCI-002450 |
| 24 | + nist: SC-12(2),SC-12(3),SC-13 |
| 25 | + srg: SRG-OS-000396-GPOS-00176,SRG-OS-000478-GPOS-00223 |
| 26 | + |
| 27 | +ocil_clause: 'thee system is not booted with fips=1' |
| 28 | + |
| 29 | +ocil: |- |
| 30 | + To verify that system is booted with <tt>fips=1</tt> run the following command: |
| 31 | + $ cat /proc/cmdline |
| 32 | +
|
| 33 | + The output must contain <tt>fips=1</tt> |
| 34 | +
|
| 35 | +warnings: |
| 36 | + - general: |- |
| 37 | + To configure the OS to run in FIPS 140-3 mode, the kernel parameter "fips=1" needs to be added during its installation. |
| 38 | + Enabling FIPS mode on a preexisting system involves a number of modifications to it and therefore is not supported. |
| 39 | + - regulatory: |- |
| 40 | + System Crypto Modules must be provided by a vendor that undergoes |
| 41 | + FIPS-140 certifications. |
| 42 | + FIPS-140 is applicable to all Federal agencies that use |
| 43 | + cryptographic-based security systems to protect sensitive information |
| 44 | + in computer and telecommunication systems (including voice systems) as |
| 45 | + defined in Section 5131 of the Information Technology Management Reform |
| 46 | + Act of 1996, Public Law 104-106. This standard shall be used in |
| 47 | + designing and implementing cryptographic modules that Federal |
| 48 | + departments and agencies operate or are operated for them under |
| 49 | + contract. See <b>{{{ weblink(link="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf") }}}</b> |
| 50 | + To meet this, the system has to have cryptographic software provided by |
| 51 | + a vendor that has undergone this certification. This means providing |
| 52 | + documentation, test results, design information, and independent third |
| 53 | + party review by an accredited lab. While open source software is |
| 54 | + capable of meeting this, it does not meet FIPS-140 unless the vendor |
| 55 | + submits to this process. |
0 commit comments