64 lines
2.7 KiB
Plaintext
64 lines
2.7 KiB
Plaintext
|
---
|
||
|
layout: docs
|
||
|
page_title: Vault Enterprise FIPS Seal Wrap
|
||
|
description: |-
|
||
|
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
||
|
encryption for supporting seals. This can be used for FIPS Compliance with
|
||
|
a certified HSM.
|
||
|
---
|
||
|
|
||
|
# Seal Wrap for FIPS Compliance
|
||
|
|
||
|
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
||
|
|
||
|
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
||
|
encryption for supporting [seals](/docs/configuration/seal). This adds an
|
||
|
extra layer of protection and is useful in some compliance and regulatory
|
||
|
environments, including FIPS 140-2 environments.
|
||
|
|
||
|
To use this feature, you must have an active or trial license for Vault
|
||
|
Enterprise Plus (HSMs). To start a trial, contact [HashiCorp
|
||
|
sales](mailto:sales@hashicorp.com).
|
||
|
|
||
|
## Using Seal Wrap
|
||
|
|
||
|
See [the Enterprise documentation](/docs/enterprise/sealwrap) for instructions
|
||
|
on how to use and enable Seal Wrap.
|
||
|
|
||
|
## FIPS 140-2 Compliance
|
||
|
|
||
|
Vault's Seal Wrap feature has been evaluated by Leidos for compliance with
|
||
|
FIPS 140-2 requirements. When used with a FIPS 140-2-compliant HSM, Vault will
|
||
|
store Critical Security Parameters (CSPs) in a manner that is compliant with
|
||
|
KeyStorage and KeyTransit requirements. This is on by default for many parts of
|
||
|
Vault and opt-in for each individual mount; see the Activating Seal Wrapping
|
||
|
section below for details.
|
||
|
|
||
|
[Download the current compliance letter](/docs/enterprise/sealwrap/Vault_Compliance_Letter_signed.pdf)
|
||
|
|
||
|
### Updates Since The Latest FIPS Compliance Audit
|
||
|
|
||
|
The following are values that take advantage of seal wrapping in the current
|
||
|
release of Vault that have not yet been asserted as compliant by Leidos. The
|
||
|
mechanism for seal wrapping is the same, they simply were not specifically
|
||
|
evaluated by the auditors.
|
||
|
|
||
|
- Root tokens
|
||
|
- Replication secondary activation tokens
|
||
|
- Client authentication information for the GCP Auth Backend
|
||
|
- Client authentication information for the Kubernetes Auth Backend
|
||
|
|
||
|
## Seal Wrap and Replication
|
||
|
|
||
|
Because of the level of flexibility targeted for replication, values sent over
|
||
|
replication connections do not currently meet KeyTransit requirements for FIPS
|
||
|
140-2. Vault's clustering implementation does support best practices guidance
|
||
|
given in FIPS 140-2, but the cryptographic implementation of TLS is not FIPS
|
||
|
140-2 certified. We may look into providing certified TLS in the future for
|
||
|
replication traffic; in the meantime, a transparent TCP proxy that supports
|
||
|
certified FIPS 140-2 TLS (such as
|
||
|
[stunnel](https://www.stunnel.org/index.html)) can be used for replication
|
||
|
traffic if meeting KeyTransit requirements for replication is necessary.
|
||
|
|
||
|
[configuration]: /docs/configuration
|