Chapter 7. Federal Information Processing Standard (FIPS)
Red Hat Ceph Storage uses FIPS validated cryptography modules when run on Red Hat Enterprise Linux 7.6 or Red Hat Enterprise Linux 8.1, or Red Hat Enterprise Linux 8.2.
Enable FIPS mode on Red Hat Enterprise Linux either during system installation or after it.
- For bare-metal deployments, follow the instructions in the Red Hat Enterprise Linux 8 Security Hardening Guide.
- For container deployments, follow the instructions in the Red Hat Enterprise Linux 8 Security Hardening Guide.
Additional Resources
- Refer to the US Government Standards to know the latest information on FIPS validations.