You can enable FIPS mode to ensure that a Linux sensor can only communicate with a backend in compliance with FIPS standards.
Prerequisites
Before you can enable FIPS compliance, you must enable disk encryption on the endpoint.
Important: The Linux Sensor only supports FIPS on endpoints using RHEL.
- Open a shell terminal with a root privilege.
- To install the dracut-fips package, run the following command:
$ yum install -y dracut-fips
- Back up the initramfs file.
- To recreate an initramfs image, run the following command:
dracut -f
- To modify kernel line argument, run the following commands:
$ grubby --update-kernel=$(grubby --default-kernel) --args=fips=1 $ uuid=$(findmnt -no uuid /boot) $ [[ -n $uuid ]] && grubby --update-kernel=$(grubby --default-kernel) --args=boot=UUID=${uuid}
- To reboot your machine, run the following command:
$ reboot
- To verify that FIPS mode is enabled on the endpoint, run the following command. The resulting output of 1=enabled; 0=disabled.
$ sysctl crypto.fips_enabled
- To put libraries in place, install a FIPS-validated module.