Skip to content

Conversation

silvestre
Copy link
Member

Issue

FIPS 140-3 mode should be enabled in software to ensure that cryptographic modules used meet stringent U.S. government-validated standards for strong encryption, secure operation, tamper resistance, and compliance with regulations, thereby protecting sensitive data against unauthorized access and enhancing trust and compliance with security frameworks

Fix

Set GOFIPS140=v1.0.0, see https://go.dev/doc/security/fips140#the-gofips140-environment-variable for what that means.

# Issue

FIPS 140-3 mode should be enabled in software to ensure that cryptographic modules used meet stringent U.S. government-validated standards for strong encryption, secure operation, tamper resistance, and compliance with regulations, thereby protecting sensitive data against unauthorized access and enhancing trust and compliance with security frameworks

# Fix

Set `GOFIPS140=v1.0.0`, see https://go.dev/doc/security/fips140#the-gofips140-environment-variable for what that means.
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant