<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Federal information processing standard</title>
    <link>/en/security-and-authentication/federal-information-processing-standard/</link>
    <description>Recent content in Federal information processing standard on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/security-and-authentication/federal-information-processing-standard/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Security-and-Authentication: OpenSSL behavior</title>
      <link>/en/security-and-authentication/federal-information-processing-standard/openssl-behavior/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/federal-information-processing-standard/openssl-behavior/</guid>
      <description>
        
        
        &lt;p&gt;Dynamic OpenSSL linking is a requirement for a FIPS implementation on the client and server. The OpenText™ Analytics Database server uses the OpenSSL that resides on the host system (as indicated in &lt;a href=&#34;../../../en/supported-platforms/fips-140-2-supported-platforms/#&#34;&gt;FIPS 140-2 supported platforms&lt;/a&gt;). OpenSSL dynamically links with LDAP and Kerberos.&lt;/p&gt;
&lt;p&gt;For more information see &lt;a href=&#34;../../../en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/fips-compliance-server/#Locate&#34;&gt;Locate OpenSSL Libraries&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;libraries-on-centos-systems&#34;&gt;Libraries on CentOS systems&lt;/h2&gt;
&lt;p&gt;On a FIPS-compliant CentOS system, the database runs only with the OpenSSL libraries listed in &lt;a href=&#34;../../../en/supported-platforms/fips-140-2-supported-platforms/#&#34;&gt;FIPS 140-2 supported platforms&lt;/a&gt;. Other versions of these libraries do not run on a FIPS system. This incompatibility occurs because the FIPS security policy checksums the library to which an application is linked and verifies that the library the application executes with the same checksum.&lt;/p&gt;
&lt;h2 id=&#34;library-versioning-on-non-fips-systems&#34;&gt;Library versioning on Non-FIPS systems&lt;/h2&gt;
&lt;p&gt;Be aware that on some non-FIPS systems, versioning anomalies can occur when you install a new version of OpenSSL. Sometimes, the default OpenSSL build procedure produces libraries with versions named 1.0.0. For the database to recognize that a library has a higher version number, you must provide the library name with a higher version number. For example, when installing OpenSSL version 1.0.1t, name the libraries libcrypto.so.1.0.1t or libssl.1.0.1t (symbolic links with these names are sufficient).&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: FIPS-Enabled databases: limitations</title>
      <link>/en/security-and-authentication/federal-information-processing-standard/fips-enabled-dbs-limitations/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/federal-information-processing-standard/fips-enabled-dbs-limitations/</guid>
      <description>
        
        
        &lt;p&gt;FIPS-enabled databases have the following limitations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;You cannot create a FIPS-enabled database on a non-FIPS machine.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You cannot create a non-FIPS database on a FIPS-enabled machine.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Management Console and its daemon, &lt;a class=&#34;glosslink&#34; href=&#34;../../../en/glossary/agent/&#34; title=&#34;A daemon process that runs on each OpenText&amp;amp;trade; Analytics Database cluster node.&#34;&gt;Agent&lt;/a&gt;, are not available on FIPS-enabled databases.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copying data generated with the MD5 hashing algorithm from a non-FIPS machine to a FIPS-enabled machine results in data corruption.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Due to limitations in the FIPS cryptographic module, OpenText does not recommend enabling internode encryption in FIPS environments. If you use FIPS and internode encryption, you may experience occasional query failure due to socket closure in workloads that send a high volume of data across the network.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: Implementing FIPS 140-2</title>
      <link>/en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/</guid>
      <description>
        
        
        &lt;p&gt;Implementing FIPS 140-2 on your Vertica Analytic Database requires configuration on the server and client. While Vertica server uses FIPS-approved algorithms, Vertica clients may be running on non-FIPS-approved systems. Therefore, you must implement FIPS 140-2 compliance from end to end.&lt;/p&gt;
&lt;p&gt;For more information on implementing FIPS, see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/fips-compliance-server/#&#34;&gt;FIPS compliance for the Vertica server&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/implement-fips-on-client/#&#34;&gt;Implement FIPS on the client&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
    <item>
      <title>Security-and-Authentication: FIPS 140-2 compliance statement</title>
      <link>/en/security-and-authentication/federal-information-processing-standard/fips-140-2-compliance-statement/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/security-and-authentication/federal-information-processing-standard/fips-140-2-compliance-statement/</guid>
      <description>
        
        
        &lt;h2 id=&#34;contents&#34;&gt;Contents&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;#1summary&#34;&gt;1. Summary&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#2overview&#34;&gt;2. Overview&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#aboutvertica&#34;&gt;a. About OpenText Analytics Database&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#aboutFIPS&#34;&gt;b. About FIPS 140-2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;#VerticaandFIPS&#34;&gt;3. Database and FIPS 140-2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name=&#34;1summary&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;1-summary&#34;&gt;1. Summary&lt;/h2&gt;
&lt;p&gt;OpenText™ Analytics Database complies with Federal Information Processing Standard 140-2 (FIPS 140-2), which defines the technical requirements to be used by Federal Agencies when these organizations specify cryptographic-based security systems for protection of sensitive or valuable data. The compliance of the database with FIPS 140-2 is ensured by: 1) Integrating validated and NIST-certified third party cryptographic module(s), and using the module(s) as the only provider(s) of cryptographic services; 2) Using FIPS-approved cryptographic functions; 3) Using FIPS-approved and NIST-validated technologies applicable for the database design, implementation and operation.&lt;/p&gt;
&lt;p&gt;&lt;a name=&#34;2overview&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;2-overview&#34;&gt;2. Overview&lt;/h2&gt;
&lt;p&gt;&lt;a name=&#34;aboutvertica&#34;&gt;&lt;/a&gt;a. About OpenText Analytics Database&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;OpenText™ Analytics Database is a high performance relational database management system used for advanced analytics applications. Its performance and scale is achieved through a columnar storage and execution architecture that offers a massively parallel processing solution. Aggressive encoding and compression allows the database to perform by reducing CPU, memory and disk I/O Processing times.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For more details about the database and its usage, see &lt;a href=&#34;../../../en/architecture/#&#34;&gt;Architecture&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a name=&#34;aboutFIPS&#34;&gt;&lt;/a&gt;b. About FIPS 140-2&lt;/p&gt;
&lt;p&gt;FIPS (Federal Information Processing Standard) 140-2, &lt;em&gt;Security requirements for cryptographic modules&lt;/em&gt;, is the Federal standard for proper cryptography for computer systems purchased by the government.&lt;/p&gt;
&lt;p&gt;The Federal Information Processing Standards Publication (FIPS) 140-2, “Security Requirements for Cryptographic Modules,” was issued by the National Institute of Standards and Technology (NIST) in May, 2001.&lt;/p&gt;
&lt;p&gt;The benefits of using FIPS 140-2 validated crypto module is that the crypto algorithms are deemed appropriate and that they perform the encrypt/decrypt/hash functions correctly. The standard specifies the security requirements for cryptographic modules utilized within a security system that protects sensitive or valuable data. The requirements can be found in the following documents:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf&#34;&gt;SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf&#34;&gt;Annex A: Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a name=&#34;VerticaandFIPS&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;3-database-and-fips-140-2&#34;&gt;3. Database and FIPS 140-2&lt;/h2&gt;
&lt;p&gt;FIPS 140-2 validated third party module&lt;/p&gt;
&lt;p&gt;The database conforms with FIPS 140-2 Level 1 compliance by dynamically linking to the FIPS 140-2 approved OpenSSL cryptographic module provided by the Operating System, which in our initial release is &lt;a href=&#34;http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#2441&#34;&gt;Red Hat Enterprise Linux 6.6 OpenSSL Module.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The database can be configured to operate in FIPS-compliant mode ensuring its functions and procedures like SSL/TLS connections, which require cryptography (secure hash, encryption, digital signatures, etc.) makes use of the crypto services provided by &lt;a href=&#34;https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp2441.pdf&#34;&gt;RedHat Enterprise Linux 6.6 OpenSSL Module v3.0&lt;/a&gt; which is validated for FIPS 140-2. If you are not running on a &lt;a href=&#34;../../../en/supported-platforms/fips-140-2-supported-platforms/&#34;&gt;FIPS-compliant operating system that the database supports&lt;/a&gt;, you will not be able to run the database on FIPS mode. The assurance that the database is using the right FIPS 140-2 encryption modules is managed at the operating system level by RedHat’s implementation.&lt;/p&gt;
&lt;p&gt;The database checks the OS level flag setting /proc/sys/crypto/fips_enabled to kick off the FIPS mode installation. Further details about how to install and configure the database and its components to conform to FIPS 140-2 standard appear in the installation and security guides:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/setup/set-up-on-premises/install-using-command-line/install-with-installation-script/#&#34;&gt;Install Vertica with the installation script&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/security-and-authentication/federal-information-processing-standard/#&#34;&gt;Federal information processing standard&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Modes of Operation&lt;/p&gt;
&lt;p&gt;The database server operates in one of two modes determined by the OS configuration.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;FIPS-compliant mode – supports FIPS 140-2 compliant cryptographic functions. In this mode, all cryptographic functions, default algorithms and key lengths are bound to those allowed by FIPS 140-2.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Standard mode – non-FIPS 140-2 compliant mode which utilizes all existing database cryptography functions.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;TLS/SSL3.x&lt;/p&gt;
&lt;p&gt;All the client/server communications can be secured with FIPS-compliant Transport Layer Security TLS1.2/SSL3.1 or higher. It is relying on FIPS 140-2 approved hash algorithms and ciphers.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;TLS handshake, key negotiation and authentication provides data integrity and uses secure hash and FIPS 140-2 approved cryptography and digital signature.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;TLS encryption of data in transit provides confidentiality and making use of FIPS 140-2 approved cryptography.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Secure Hash&lt;/p&gt;
&lt;p&gt;Per FIPS 140-2 standards, the database, in the FIPS 140-2 compliant mode, can be configured to use only the SHA-512 algorithm.&lt;/p&gt;
&lt;p&gt;FIPS 140-2 Architecture&lt;/p&gt;
&lt;p&gt;OpenText™ Analytics Database is a relational database system that is comprised of a client component and a server component. On the client Side, we offer a suite of drivers for host clients to access the server-side component. Both client and server components conform to FIPS 140-2 Level 1 compliance by dynamically linking to the FIPS 140-2 approved OpenSSL cryptographic module provided by RedHat Enterprise Linux 6.6 OpenSSL Module.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;../../../images/fips/fips-all.png&#34; alt=&#34;&#34;&gt;&lt;/p&gt;
&lt;p&gt;Supported Platforms&lt;/p&gt;
&lt;p&gt;See &lt;a href=&#34;../../../en/supported-platforms/fips-140-2-supported-platforms/#&#34;&gt;FIPS 140-2 supported platforms&lt;/a&gt; for information about FIPS-compliant operating systems and client drivers that the database supports.&lt;/p&gt;
&lt;p&gt;Design Assurance&lt;/p&gt;
&lt;p&gt;The database uses the security provider &lt;a href=&#34;https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/security-policies/140sp2441.pdf&#34;&gt;Red Hat Enterprise Linux 6.6 OpenSSL Module v3.0&lt;/a&gt;. This is the only supported security provider for FIPS 140-2.&lt;/p&gt;
&lt;p&gt;Once you have configured the database to be compliant with FIPS 140-2, you cannot revert back to the standard configuration unless you disable FIPS 140-2 at the operating system level. Please reference the following documentation section for considerations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/fips-compliance-server/#&#34;&gt;FIPS compliance for the Vertica server&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href=&#34;../../../en/security-and-authentication/federal-information-processing-standard/implementing-fips-140-2/implement-fips-on-client/#&#34;&gt;Implement FIPS on the client&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

      </description>
    </item>
    
  </channel>
</rss>
