# kubectl patch secret custom-properties -n rtf -p='{"stringData":{"FIPS_ENABLED": "true"}}'
Enabling FIPS 140-2 on Mule Applications
You can configure Mule application containers to run in FIPS 140-2 compliance mode.
These instructions assume that you are familiar with FIPS 140-2, the US government security standard that requires that compliant parties use only cryptographic algorithms and techniques that have been certified by NIST.
Enable FIPS 140-2 Compliance Mode
-
Using
kubectl
, patch thecustom-properties
secret in thertf
namespace by setting theFIPS_ENABLED
key totrue
:After making this change, when you deploy new applications or restart existing applications, their containers run in FIPS 140-2 compliance mode.
-
To verify an application is running in FIPS 140-2 compliance mode, review the application’s startup log:
# kubectl logs <app-pod-name> -n <env-id> -c app -f| grep -i fips Running in FIPS mode * Security model: fips140-2 * * - mule.security.model = fips140-2