Appears AWS is phasing out 3DES, pointing back to NIST 800-131A that reminds us 3DES moves to "disallowed after 2015."

Seems appropriate that we update our XCCDF and OVAL content to phase out 3DES. We'd be slightly ahead of the end of year, but any objections to writing a patch to phase out 3DES from approved algorithms now?


-------- Forwarded Message --------
Subject:        AWS GovCloud (US) Updates for FIPS 140-2 Compliance
Date:   Fri, 4 Dec 2015 21:55:45 +0000
From:   Amazon Web Services, Inc. <[email protected]>
To:     Shawn Wells <shawn@.....>



Dear AWS Customer,

We are contacting you to explain some configuration changes to enhance FIPS 
140-2 security and system performance for the AWS GovCloud (US) region. Please 
review this information carefully to determine whether your use of services 
will be affected, and if so what you need to do.

3DES Deprecation
-----------------------
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic 
protocols that used to encrypt data sent over untrusted networks such as the 
Internet. The TLS protocol is a newer version of the SSL protocol. In this 
documentation, we refer to both SSL and TLS protocols as the SSL protocol.

In support of our customer’s requirements, AWS GovCloud (US) provides FIPS 140-2 compliant SSL 
endpoints. NIST Special Publication sp800-131A specifies the approval status of the 3DES block 
cipher algorithm as "Restricted through 2015" and "Disallowed after 2015" for 
FIPS 140-2 encryption. AWS GovCloud (US) currently supports AES-128 and AES-256 algorithms 
compliant with FIPS 140-2, and will be deprecating support for the 3DES algorithm on March 31, 
2016. As an intermediate step, AWS GovCloud (US) has deprioritized the 3DES algorithm to the least 
preferred position in the available cipher options proffered by SSL endpoints.

For most customers there is no action required as a result of this change. 
However, customers that have either configured their clients specifically to 
use only 3DES, or which have clients that don’t support AES, will need to 
update their systems to avoid impact prior to the 3DES deprecation date.

If your client is configured to prefer 3DES, but supports AES, it will continue 
to work with no interruption in service after the deprecation date. The 
administrators of your system or Information System Security Officer may know 
if you have specified 3DES as the only acceptable cipher suite. In that case, 
you’ll need to make a configuration change to accept AES if your system 
requires or desires compliance with FIPS 140-2 standards.

Software Load Balancers
-------------------------------
AWS is transitioning the FIPS endpoint systems used for AWS GovCloud (US) from 
hardware load balancers to software load balancers for SSL/TLS offloading. We 
have measured at least a 4X improvement in performance for data downloads using 
FIPS approved software load balancers over the current hardware implementation. 
The new software load balancer is implemented using industry leading TLS 1.2 
with AES cipher suites, which represents an improvement in the security of 
connections to GovCloud while adhering to current compliance requirements.

This transition changes the AWS GovCloud FIPS 140-2 implementation from Level 2 
(hardware required) to Level 1. Note that FIPS 140-2 Level 1 implements the 
same level of security in the encryption as Level 2 and does not impact the AWS 
GovCloud (US) FedRAMP authorization, as FedRAMP does not specify a required 
FIPS 140-2 Level. We recommend however, that customers review and update their 
System Security Plans or other documentation that may refer to AWS GovCloud 
(US) utilizing Level 2.

For more information, see the list of frequently asked questions (FAQs) below. 
Of course, AWS Support is always available to assist and can be contacted at 
https://console.aws.amazon.com/support/. Remember to use the credentials for 
the standard AWS account that you used to sign up for AWS GovCloud (US) to 
authenticate to the AWS Support Center.
Thank you for being an AWS customer!

Sincerely,
The AWS GovCloud (US) Team

-----------------------------------------------

Frequently Asked Questions: AWS GovCloud (US) Updates for FIPS 140-2 Compliance
Q. What is FIPS 140-2?
The Federal Information Processing Standard (FIPS) Publication 140-2 is a US 
government security standard that specifies security requirements for 
cryptographic modules protecting sensitive information. To support customers 
with FIPS 140-2 requirements, the AWS GovCloud (US) region provides SSL 
terminations (a.k.a. service endpoints) that operate using load balancers with 
FIPS 140-2 certified modules.

Q. Why is AWS deprecating support for the 3DES algorithm?
The 3DES algorithm (a.k.a. Triple DES, TDEA, and Triple Data Encryption 
Algorithm) is an older data encryption standard that will no longer be 
recognized as a FIPs 140-2 approved cipher after December 31, 2015. After this 
date, customers with FIPS 140-2 requirements will not be compliant if they bind 
to the 3DES cipher. The 3DES algorithm was designed for legacy generation 
hardware implementations and may be vulnerable to brute force attack with 
increasingly powerful computing technology. AWS is therefore deprecating 
support for the 3DES cipher in the AWS GovCloud (US) region. To support 
customers that don’t have FIPS requirements, the region will continue to 
support the 3DES cipher until at least March 31, 2016. We recommend that 
customers review their applications to ensure appropriate use of the latest 
ciphers.

Q. How do I determine if I’m using the 3DES cipher?
The algorithm used to encrypt data for transport is determined by your 
application and the supported client configurations for your application. Your 
application may be supported by legacy software components that do not support 
AES cipher suites (although this is not common as AES has been a Federal 
Government standard since 2002). There are no customer settings to configure 
for choosing your preferred cipher in AWS GovCloud (US). The FIPS 140-2 
compliant load balancers are able to detect which suite is cipher is used.

Q. How do I migrate off of the 3DES cipher?
Customers with FIPS 140-2 requirements should review their applications and 
supported clients to ensure appropriate support for the latest approved 
encryption ciphers. Customers without FIPS 140-2 requirements can continue to 
use AWS GovCloud (US) by utilizing the available non-FIPS SSL endpoints.

Q. Could anything break when I change from the 3DES cipher?
Customers will need to evaluate the impact of any changes to their application. 
For example, their users may need to upgrade their web browser or other 
software dependencies to ensure uninterrupted application availability.

Q. Why is AWS changing from FIPS Level 2 to FIPS Level 1? Is this a lower level 
of protection?
FIPS 140-2 Level 1 implements the same level of security in the encryption as 
Level 2. This change does not impact the AWS GovCloud (US) FedRAMP 
authorization, as FedRAMP does not specify a required FIPS 140-2 Level. The 
updated software load balancers now operate independent of any specific 
hardware device, which provides improved system performance, easier upgrades, 
and more flexible scaling to meet the needs of AWS GovCloud (US) customers.

Amazon Web Services, Inc. is a subsidiary of Amazon.com, Inc. Amazon.com is a 
registered trademark of Amazon.com, Inc. This message was produced and 
distributed by Amazon Web Services Inc., 410 Terry Ave. North, Seattle, WA 
98109-5210



--
SCAP Security Guide mailing list
[email protected]
https://lists.fedorahosted.org/admin/lists/[email protected]
https://github.com/OpenSCAP/scap-security-guide/

Reply via email to