[4.16] - Mar 31, 2023

Fortanix Data Security Manager (DSM) 4.16 comes with some exciting new enhancements, improvements, and resolved issues.

This release is superseded by April 14, 2023, release.

WARNING
  • It is REQUIRED to upgrade Fortanix DSM to version 4.11 or 4.13 before upgrading to version 4.16. If you want to upgrade to 4.16 from an older version, please reach out to the Fortanix Support team.
  • After upgrading to version 4.16, Fortanix DSM can NO LONGER be downgraded to any prior version. This is due to limitations of common infrastructure components such as Docker and Kubernetes.
NOTE
  • The Fortanix DSM cluster upgrade must be done with Fortanix Support on call. Please reach out to Fortanix Support if you are planning an upgrade.
  • The customer's BIOS version must be checked by Fortanix Support prior to the Fortanix DSM software upgrade. If required, the BIOS version should be upgraded to the latest version and verified by Fortanix Support for a smooth upgrade.
  • If your Fortanix DSM version is 4.13 or later, then the HSM gateway version must also be 4.13 or later. Similarly, if the HSM Gateway version is 4.13 or later, then your Fortanix DSM version must be 4.13 or later.

1. Enhancements to Existing Features

  1. Created different input and output data types for custom tokenization (JIRA: PROD-6079).:

    This release allows customers to create a custom tokenization security object with two different character sets to perform tokenization and detokenization so that the input of a particular data type will be tokenized to a different data type for the output token. This feature is allowed only for “Number” data type as raw input data and the tokenized output data can be alphabetic characters from (A-J).

    Tokenization-OutputDataType.png For more details refer to the User’s Guide: Tokenization.
  2. Enabled External Key Store (XKS) support for AWS KMS for all Fortanix DSM accounts (JIRA: PROD-5621).
    External Key Store (XKS) support for AWS KMS is now enabled for all Fortanix DSM accounts. This manifests itself as a new authentication method, “AWS XKS” for app definitions in DSM. AWS_XKS_On.png

    For more details, refer to Integration Guide: DSM with AWS XKS.

  3. Updated the UI description for the DSM Data Export feature (JIRA: ROFR-3946).
    The description of the Data Export feature has been updated to make it clear that only the security object metadata, not the sensitive data, is being exported. DataExport.png
  4. New improved Audit log table pagination design (JIRA: ROFR-3789).
    • Added support to search audit logs using the “Select a month” filter to search audit logs for any 31-day period.
    AuditLog.png
  5. Added Email Verification pop-up banner for DSM SaaS users to verify their email address (JIRA: ROFR-3885).
    • This banner is displayed only for unverified users to re-verify their email addresses.
    • The banner will be displayed on the DSM Accounts list page and DSM, CCM, and CAI Accounts Home page.
    EmailVerification2.png

  6. Improved the activity logs for DSM apps and users (JIRA: ROFR-3901).
    The activity logs on the apps and users' detail page and list view page now also show the audit logs when the apps or users are actors or objects. AuditLogActor.png
      AuditLogActor1.png
  7. Improved the drop down component for loading KEKs in the drop down for the “Configure KEK from an existing group” workflow in the New Groups page and Group’s detail page (JIRA: ROFR-3891)..
    • Only three groups will be shown at a time in the drop down menu and the remaining groups can be selected using a scroll. KEK-Groups.png
    • The KEKs in the dropdown menu are now sorted by name in ascending order.
    • Added padding below the KEK drop down menu so that you can view at least 6 KEKs without extra scroll. KEK-Sort.png
  8. Added a human-readable view for quorum approval request modal window when importing a key that has been encrypted (JIRA: ROFR-2941).
    Improved the modal window for quorum approval requests when importing a key that has been encrypted with another key.
    QP-Import-unwrap.png
  9. The group detailed view security objects show/hide columns list is now consistent with the main security objects show/hide columns list (JIRA: ROFR-2830).
    \SOColumn.png
     
  10. Updated the AWS KMS, GCP, and Azure icons on the DSM SaaS subscription page (JIRA: ROFR-2488).
    AWSIcon.png
     
  11. The RSA key creation flow in DSM now selects the default Encryption and Signature Padding policy (JIRA: ROFR-2192).
      RSA-Padding.png
  12. Added System Administration setting to configure the authentication retries in Fortanix DSM and lock user's account temporarily (JIRA: PROD-6406).
    This release adds a setting that allows a system administrator to set the maximum number of authentication attempts and the amount of time an account is temporarily locked to stop unauthorized access when the user tries to log in to Fortanix DSM with a wrong password. AuthenicationLockout.png

For more details, refer to System Administration Settings Guide: Policies

2. Other Improvements

  • Added control-plane toleration to Kubernetes workloads (JIRA: DEVOPS-3674).
  • Node attestation now uses (“IAS-v4”) version 4 instead of version 3 (JIRA: PROD-6355). NOTE: IAS-v3 will be deprecated soon, after which you will not be able to upgrade to DSM versions below 4.8.
  • Improved SWDist to handle duplicate files more efficiently (JIRA: DEVOPS-3052).
  • Implemented a global service for refreshing the approval requests list (JIRA: ROFR-2869).
  • Improved User Interface support for LMS, ECKCDSA, and BLS key parameters when rotating, copying, or deriving these keys (JIRA: ROFR-3922).
  • Removed the maximum length limit on the email address input field (JIRA: ROFR-3936).
  • A deactivated key can now be automatically enabled using the mark_key_disable_when_deactivated parameter by setting its value to false. (JIRA: PROD-6028). For more information, refer to Enabling a Deactivated Key.

3. Integrations

  1. Added support for Fortanix DSM with BeyondTrust Password Safe integration (JIRA: UX-2125). For more information, refer to DSM with BeyondTrust Password Safe Guide.
  2. Added support for Easy Wizard integration for DSM with Salesforce (JIRA: ROFR-3900). For more information, refer to DSM with Salesforce using easy wizard integration Guide.

4 Client Enhancements

  1. Extended BLS algorithm support to the DSM Java client (JIRA: PROD-6478).
  2. Published the Microsoft CNG/EKM Provider client (Windows 64bit Installer) (JIRA: DEVOPS-3408).
  3. Published the Microsoft CNG Fortanix DSM client to the public repository (JIRA: DEVOPS-3326). For more details refer to the Instructions to install the CNG client from public repo.

5. DSM Accelerator Client Enhancements

  • DSM-Accelerator Webservice:
    • Added GET / endpoint support in DSM-Accelerator web service (JIRA: PROD-6274).

6. Quality Enhancements/Updates

7. Bug Fixes

  • Fixed an issue where the user was unable to detokenize with cipher_char_set and preserve parameter (JIRA: PROD-6538).
  • Fixed an issue where email confirmation link sent during user signup had an invalid user ID (JIRA: PROD-6509).
  • Fixed a crash in the DSM app creation flow (JIRA: ROFR-3967).
  • Fixed an issue that failed to enable the “Public key published” and resulted in an error upon Save (JIRA: ROFR-3966).
  • Fixed an issue where the default permissions were not enabled when creating an AES key in the AWS KMS and Azure Key Vault groups (JIRA: ROFR-3965).
  • Fixed an uncaught error when regenerating the DSM app credentials and setting an expiry date (JIRA: ROFR-3963).
  • Fixed a page crash when searching a DSM group using the groups filter (JIRA: ROFR-3961).
  • Fixed an error that breaks the UI when creating an HMG configuration with TLS set to disabled or opportunistic (JIRA: ROFR-3947).
  • Fixed an issue where the DSM UI did not show the secret when clicking on the Show button (JIRA: ROFR-3945).
  • Fixed an issue where the DSM-Accelerator webservice did not support PEM-formatted private keys (JIRA: PROD-6436).
  • Fixed the alignment when the AWS keys are in “Pending deletion” state (JIRA: ROFR-3921).
  • Fixed a 500 status error when the size query parameter is 0 in the GET audit logs API (JIRA: PROD-6367).
  • Fixed an issue where the Quorum approval policy still exists even after deleting it from the Account Settings page (JIRA: ROFR-3913).
  • Fixed an issue where admin apps were not shown in the “Created by” column in the security objects table view (JIRA: ROFR-3911).
  • Fixed an issue that did not allow removing the HMG configuration from a FIPS-backed group (JIRA: ROFR-3883).
  • Fixed the following issues for the following DSM application workflows (JIRA: ROFR-3882).
    • Fixed an issue that resulted in displaying wrong Credentials button label during a DSM app creation of a particular interface type.
    • Fixed inconsistent label for the submit button when changing an application’s authentication method.
  • Fixed an issue in the EC key generation workflow where the “Curve” value should be blank rather than unknown (JIRA: ROFR-3871).
  • Fixed an issue where an LDAP user was not able to log in when the cluster is in read-only mode (JIRA: DEVOPS-3552).
  • Fixed some UX issues in the easy wizard integration for Cloud Data Control with log aggregation (JIRA: ROFR-3855).
  • Fixed an issue where the KCV value was missing in the security object CSV reports (JIRA: ROFR-3903).
  • Fixed an issue where a user gets a “Token is invalid” error due to a conflicting email address in the email verification workflow (JIRA: ROFR-3809).
  • Fixed an issue in DSM-Accelerator JCE where GCM, CCM, and OFB modes were not supported for AES encrypt or decrypt operations (JIRA: PROD-6022).
  • Fixed an issue in DSM-Accelerator JCE where "iv" was required to perform decryption for AES cipher mode: ECB, KW, or KWP and for DES and DES3 modes: ECB (JIRA: PROD-6021).
  • Fixed an issue where triggering an email change should not break the previous email verification state (JIRA: PROD-6020).
  • Fixed an issue where key wrapping using the RSA key did not show the supported padding schemes (JIRA: ROFR-3750).
  • Fixed an issue where even after enabling the Get All Approval Requests custom role, the user was unable to see the request in the Tasks tab (JIRA: PROD-2336).
  • Fixed different audit backup TAR file names in the Azure container (JIRA: DEVOPS-3068).
  • Fixed incorrect user email verification state (JIRA: PROD-4833).
  • Fixed an issue where the user was unable to update the authentication token in the Splunk log management configuration in the System Administration settings (JIRA: ROFR-2919).
  • Fixed an issue where the user was unable to disable the "audit log" on a secret or opaque object (JIRA: ROFR-2421).
  • Fixed an issue where the user was unable to get into maintenance mode using the ipmitool sol activate command when performing an Ubuntu recovery (JIRA: DEVOPS-3339).

8. Known Issues

  • When a node is removed from a 3-node cluster with build 4.2.2087, and the 2-node cluster is upgraded with build 4.3.xxxx, it is possible that the deploy job is exited and marked completed before cluster upgrade (JIRA: DEVOPS-2068). Workaround: If all the pods are healthy, you can deploy the version again.
  • The sync key API returns a “400 status code and response error” due to the short-term access token expiry during the sync key operation of a group linked to AWS KMS (JIRA: PROD-3903).
  • exclude does not work in the proxy config for operations such as attestation (JIRA: PROD: 3311).
  • Unable to perform Local encrypt/decrypt operation in Fortanix DSM-Accelerator using DES3 algorithm in CBC/ECB mode with the key size 112 (JIRA: PROD-5598).

9. Fortanix Data Security Manager Performance Statistics

9.1 Series 2

Key Types and Operations Throughput (Operations/second on a  3-node cluster)
AES 256: CBC Encryption/Decryption

4,830/4,704

AES 256: GCM Encryption/Decryption

4,818/4,742

AES 256: FPE Encryption/Decryption

2,280/2,235

AES 256 Key Generation

1,163

   
RSA 2048 Encryption/Decryption

4,311/1,034

RSA 2048 Key Generation

30

RSA 2048 Sign/Verify

1,039/4,229

EC NISTP256 Sign/Verify

1,021/581

   
Data Security Manager Plugin (Hello world plugin)

1,845 (invocations/second)

________________________________________________________________________________________________________________

 

9.2 Azure Standard_DC8_v2

Key Types and Operations Throughput (Operations/second on a  3-node [Standard_DC8_v2] cluster)
AES 256: CBC Encryption/Decryption

3,497/3,506

AES 256: GCM Encryption/Decryption

3,480/3,506

AES 256: FPE Encryption/Decryption

1,820/1,767

AES 256 Key Generation

1,000

   
RSA 2048 Encryption/Decryption

3,185/1,045

RSA 2048 Key Generation

41

RSA 2048 Sign/Verify

1,038/3,275

EC NISTP256 Sign/Verify

819/492

   
Data Security Manager Plugin (Hello world plugin)

1,617 (invocations/second)

________________________________________________________________________________________________________________

 

9.3 Series 2 JCE

Key Types and Operations Throughput (Operations/second on a  3-node cluster)
AES 256: CBC Encryption/Decryption

3,901/3,871

AES 256 Key Generation

1,163

   
RSA 2048 Key Generation

30

RSA 2048 Sign/Verify

813/1,925

EC NISTP256 Sign/Verify

816/516

   
Data Security Manager Plugin (Hello world plugin)

1,811 (invocations/second)

________________________________________________________________________________________________________________

 

9.4 Azure Standard_DC8 JCE

Key Types and Operations Throughput (Operations/second on a  3-node [Standard_DC8 JCE] cluster)
AES 256: CBC Encryption/Decryption

3,059/3,189

AES 256 Key Generation

1,028

   
RSA 2048 Key Generation

40

RSA 2048 Sign/Verify

778/1,685

EC NISTP256 Sign/Verify

655/426

   
Data Security Manager Plugin (Hello world plugin)

1,629 (invocations/second)

10. Fortanix Data Security Manager-Accelerator Performance Statistics

10.1 Runtime Environment

NOTE
  • The following table lists the standard recommended runtime environment. You can choose a higher configuration for better performance.
  • DSM-Accelerator was run in the runtime environment listed below for performance testing.
Item Specification
Number of Cores

4

CPU

Intel(R) Xeon(R) CPU E5-2673 v4 @ 2.30GHz

RAM

32 GiB

________________________________________________________________________________________________________________

 

10.2 DSM-Accelerator Webservice

NOTE
The performance numbers below are captured with a single node; if you need higher performance or throughput, then we recommend adding multiple nodes.
Key Types and Operations Throughput (Operations/second on a 1-node cluster)
AES 256: CBC Encryption/Decryption

9,925/9,926

AES 256: GCM Encryption/Decryption

9,730/9,682

AES 256: FPE Encryption/Decryption

3,897/3,845

________________________________________________________________________________________________________________

 

10.3 Additional Modes

Key Types and Operations Throughput (Operations/second on a 1-node cluster)
AES 256: CBCNOPAD Encryption/Decryption

8,948/8,715

AES 256: CFB Encryption/Decryption

9,971/10,036

AES 256: CTR Encryption/Decryption

10,006/9,998

AES 256: OFB Encryption/Decryption

9,941/9,946

11. Installation

To download the DSM SGX (on-prem/Azure) and Software (AWS/Azure/VMWare) packages, click here.

Comments

Please sign in to leave a comment.

Was this article helpful?
0 out of 0 found this helpful