Skip to content

Commit

Permalink
[DX-1579] Publish FIPS amendments (#5166)
Browse files Browse the repository at this point in the history
approval obtained from Jessica via slack conversation

---------

Co-authored-by: Simon Pears <[email protected]>
  • Loading branch information
dcs3spp and Simon Pears authored Aug 2, 2024
1 parent 20506fb commit d5a806b
Showing 1 changed file with 13 additions and 20 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -31,28 +31,19 @@ in the context of [API management]({{< ref "#importance-of-FIPS-Compliance-in-AP

## Tyk's FIPS Compliance

We are pleased to announce that Tyk Gateway and Pump now offer FIPS compliance. The FIPS Tyk Gateway and the FIPS Tyk
Pump package (together, the *"FIPS Tyk Product"*) is FIPS 140-2 compliant.
We are pleased to announce that Tyk Gateway and Pump now offer a FIPS compliant package (together, the *"FIPS Tyk
Product”*).
FIPS compliance means that the *FIPS Tyk Product* only uses FIPS 140-2 approved algorithms while running in FIPS mode.
However, the product has not been submitted to a [NIST](https://www.nist.gov/federal-information-processing-standards-fips) testing lab for validation. Compliance applies only to special
built packages or docker images of the *FIPS Tyk Product*. These packages and images are not publicly accessible. Please
speak to your assigned account manager for more information.

To achieve FIPS compliance, our components are compiled with a FIPS-validated crypto/hashing library. Specifically, Tyk
uses [BoringCrypto](https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp3678.pdf), a FIPS-validated crypto/hashing library available for Go.
uses [BoringCrypto](https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp3678.pdf),
a FIPS-validated crypto/hashing library available for Go.

**Note:** The use of the *FIPS Tyk Product* is conditional on user accepting any specific terms and conditions applicable to this
feature and a paid license. **Please contact your account manager** if you would like further information

### The definition of "compliance"
The *FIPS Tyk Product* is designed to be compliant by using only FIPS 140-2 approved algorithms while running in FIPS
mode. It's important to note that while the product adheres to compliance standards, it has not undergone formal
validation by a [NIST](https://www.nist.gov/federal-information-processing-standards-fips) testing lab. This compliance
is specific to specially built packages or docker images of the *FIPS Tyk Product*.

These packages and images are not publicly accessible. You can request them by contacting your assigned account manager.

### Verification and Certification

Tyk's FIPS compliance is based on the use of FIPS 140-2 validated cryptographic modules, specifically the BoringCrypto
module. While the *FIPS Tyk Product* is compliant with FIPS 140-2, it has not undergone formal validation by a NIST
testing lab.
**Note:** The use of the *FIPS Tyk Product* is conditional on user accepting any specific terms and conditions
applicable to this feature and a paid license. Please contact your account manager if you would like further information.

### FIPS-Compliant Cryptographic Operations

Expand All @@ -76,10 +67,12 @@ Q: What level of FIPS 140-2 compliance does Tyk support?
A: Tyk provides FIPS 140-2 compliance, ensuring the use of approved algorithms in FIPS mode.

Q: Can I use Tyk in FIPS mode in cloud environments?

A: Yes but only for hybrid gateways deployed on your premise and connecting to the Cloud control plane.

Q: Does FIPS mode affect Tyk's performance?
A: There may be a slight performance impact due to the use of FIPS-approved algorithms, but this is generally minimal.

A: There should be no material impact on performance.


## Importance of FIPS Compliance {#importance-of-FIPS-Compliance}
Expand Down

0 comments on commit d5a806b

Please sign in to comment.