Skip to main content

Sonatype Lifecycle FIPS 140-3 Compliance

This guide provides instructions for enabling FIPS compliance in Sonatype Lifecycle on-premises deployments.

Federal Information Processing Standards (FIPS) Compliance

Federal Information Processing Standards (FIPS) 140-3 are U.S. government cybersecurity standards that define security requirements for cryptographic modules. FIPS compliance ensures that a product uses only FIPS-validated algorithms and modules, which is a requirement for many federal agencies and is also widely adopted in regulated industries.

Sonatype Lifecycle achieves FIPS compliance by leveraging the Bouncy Castle FIPS-certified API (BCFIPS) for all cryptographic operations when running in FIPS mode. Standard Lifecycle uses Java providers and the non-FIPS Bouncy Castle API.

Overview

Sonatype Lifecycle can operate in either standard mode or FIPS-compliant mode. In standard mode, it uses Java’s built-in cryptographic providers together with the Bouncy Castle standard API. In FIPS-compliant mode, it relies on the Bouncy Castle FIPS-certified API to perform all cryptographic operations in accordance with FIPS 140-3 standards.

FIPS-compliant Lifecycle is currently available only for new on-premises installations. While FIPS is technically a mode that can be enabled or disabled, existing standard Lifecycle deployments cannot be converted to FIPS mode. Customers must decide whether to deploy in standard mode or FIPS mode at the time of installation.

Prerequisites

Before enabling FIPS mode in Sonatype Lifecycle, ensure the following:

  • A valid FIPS-compatible Lifecycle license from Sonatype.

  • A FIPS-compliant operating system (e.g., RHEL, Fedora).

  • Ensure that the PostgreSQL administrator account used by Lifecycle is secured with a secure password.

  • Lifecycle IQ server version 195 or higher (minimum supported version for FIPS).

Enabling or Disabling FIPS Mode

  • Enable FIPS mode

    To enable FIPS mode, set the environment variable to true:

    FIPS_MODE_ENABLED=true
  • Disable FIPS mode

    To disable FIPS mode, set the environment variable to false:

    FIPS_MODE_ENABLED=false

Considerations

Lifecycle FIPS is designed for new installations only. It is important to understand the following limitations before enabling FIPS mode:

  • FIPS mode is supported only for new deployments of Sonatype Lifecycle from version 195 and beyond.

  • Existing configurations (such as SCM connections, user tokens, and related settings) from standard Lifecycle are not compatible with FIPS mode. Likewise, FIPS mode configurations cannot be used in standard Lifecycle.

  • While FIPS is technically a configurable mode within Lifecycle (it can be enabled or disabled at the environment level), there is currently no supported migration path from a standard Lifecycle deployment to FIPS mode.

  • Customers must decide whether to use FIPS mode or standard mode at the time of installation. Once a deployment is set up in FIPS mode, it cannot be converted back to standard mode, and standard installations cannot be converted into FIPS mode.

Summary of Key Differences

The following functions differ between FIPS and non-FIPS Lifecycle:

Category

FIPS Mode

Non-FIPS Mode

Email Processing

SSL Enabled option unavailable

SSL Enabled option available

Encryption Algorithm

AES/GCM/NoPadding

AES/CBC/PKCS5Padding

HMAC

HmacSHA256

HmacSHA256HmacSHA1

Hashing Algorithm

SHA-256

argon2id

Keystore Type

BCFKS

PKCS12

Certificates

X.509 v3

X.509 v1