Is running software in Docker an allowable way to bypass FIPS 140-2 issues?
Someone has a service that uses a FIPS non-compatible hash in a protocol signature. When FIPS 140-2 compatibility is enabled on the hosts the service crashes (due to the hash signature being not allowed by the security configuration of th… Continue reading Is running software in Docker an allowable way to bypass FIPS 140-2 issues?