- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
A FIPS flavor of the Datadog Agent is in Preview. For more information, see FIPS Agent.
As part of the FedRAMP High effort, a number of integrations have been verified for FIPS 140-2 compliance. Integrations that are not mentioned below may function in compliance with FIPS 140-2 but have not been tested internally.
This guide is for customers that require FIPS compliant services and use Datadog integrations.
To ensure compliance, make sure to use an HTTPS endpoint whenever possible and follow the integration-specific instructions below.
Integrations marked out of the box (“OOTB”) require no further configuration.
Integration | Configuration |
---|---|
Amazon MSK | OOTB |
Apache | OOTB |
ArgoCD | OOTB |
Azure Active Directory | OOTB |
CoreDNS | OOTB |
Elasticsearch | OOTB |
Envoy | OOTB |
Haproxy | OOTB |
Istio | OOTB |
Kafka | To enable TLS make sure to follow the JMXFetch FIPS-140 mode guide. |
MongoDB | The tls option must be set to true through the integration configuration. |
MySQL | The ssl option must be set through the integration configuration. |
Nginx | OOTB |
Php-fpm | Even though the php_fpm integration uses the random module, that use is restricted to randomizing the retry delay. |
Postfix | OOTB |
RabbitMQ | OOTB |
Redis | The ssl option must be enabled through the integration configuration. |
SSH | OOTB |
TLS | OOTB |
Tomcat | To enable TLS make sure to follow the JMXFetch FIPS-140 mode guide. |
Vault | OOTB |
vSphere | Both ssl_verify and rest_api_options > tls_verify need to be set to true if using the vSphere REST API to get tags (collect_tags: true ). |
Windows Service | OOTB |
Zookeeper | The use_tls option must be enabled through the integration configuration. |
추가 유용한 문서, 링크 및 기사: