Skip to main content

Illumio Core 22.2 Install, Configure, Upgrade

FIPS Compliance for PCE

This section describes the operational requirements for compliance with Federal Information Processing Standard (FIPS) 140-2 for the PCE and VEN.

FIPS Prerequisites

RHEL 8.2 running in FIPS mode and satisfying the Security Policy as stated in Red Hat Enterprise Linux 8 OpenSSL Cryptographic Module version rhel8.20200305.1.

Non-Government Customers without FIPS Requirement

Compliance with FIPS 140-2 requires additional operational restrictions such as specific OS versions and server hardware.

Illumio recommends that non-government customers who do not have a requirement for FIPS 140-2 do not configure and deploy Illumio Core in FIPS mode.

Enable PCE FIPS Compliance
  1. After installing RHEL8.x, follow the required steps in Section 9.1, Crypto Officer Guidance, Red Hat Enterprise Linux 8 OpenSSL Cryptographic Module NIST Security Policy.

  2. Reboot the system.

  3. After the system starts, check that FIPS mode is enabled:

    $ fips-mode-setup --check FIPS mode is enabled.

  4. Install the Illumio PCE RPM.

    See After PCE Installation for information.

  5. During PCE installation, provide the PCE with SSL certificates that have a minimum RSA key size of 2048.

  6. After PCE installation, disable PCE metrics collection. Add the following to runtime_env.yml on all nodes in the cluster and restart the PCEs: metrics_collection_enabled: false

    Note

    This step is required because metrics collection currently uses non FIPS compliant components.

After completing the PCE setup, the PCE is FIPS compliant.