Overview
Rocky Linux 9 FIPS AMI is a production-ready Amazon Machine Image with FIPS mode enabled at the kernel level for organizations requiring cryptographic compliance.
FIPS Mode Configuration
FIPS mode is enabled at the kernel level. All system cryptography - including SSH, TLS, and disk encryption - uses only FIPS-approved algorithms. The Rocky Linux 9 kernel crypto module was validated under NIST CMVP #5113 for Rocky 9.2. This AMI runs the latest Rocky 9.x with FIPS mode enabled using the same algorithmic configuration. This AMI is not itself CMVP validated.
- Kernel FIPS mode active at boot (fips=1)
- System-wide FIPS crypto policy enforced
- OpenSSL, NSS, GnuTLS configured for FIPS
- Non-approved algorithms disabled: MD5, SHA-1, DES, RC4, Blowfish, Ed25519
- Approved algorithms work: AES-256, SHA-256/512, ECDSA, RSA (2048+), TLS 1.2+
Tested Workloads
Every release is tested against real-world workloads under FIPS:
- PostgreSQL with SCRAM-SHA-256 auth and SSL
- Nginx with TLS 1.2+ and FIPS-approved cipher suites
- Python 3 with hashlib, ssl, and cryptography package
- Java 17 with keytool, AES-GCM, and HMAC
- Node.js with crypto module, TLS, and FIPS detection
- Go applications with crypto/tls and FIPS-approved ciphers
- Podman containers inheriting FIPS mode from host
Terraform Module
An official Terraform module is available for automated deployment: ironsmith-io/ec2-rocky9-fips/aws on the Terraform Registry (https://registry.terraform.io/modules/ironsmith-io/ec2-rocky9-fips/aws ).
Quick Start
Launch the AMI and verify FIPS:
- Verify FIPS: fips-mode-setup --check
- Check kernel flag: cat /proc/sys/crypto/fips_enabled (returns 1)
- Check crypto policy: update-crypto-policies --show (returns FIPS)
- Confirm MD5 blocked: echo test | openssl dgst -md5 (fails)
What's Included
- Rocky Linux 9.x x86_64 (Intel/AMD, latest at build time)
- FIPS mode enabled system-wide
- cloud-init configured for AWS
- Customer-facing documentation at /usr/share/doc/ironsmith/rocky9-fips/
- Built-in FIPS verification tool: run 'sudo ironsmith' to generate compliance evidence
What's Not Included
- CIS hardening (see Rocky Linux 9 FIPS + CIS Hardened AMI)
- SSM Agent (see Known Limitations for install instructions)
- Custom applications
Security Group Recommendations
- Allow inbound TCP 22 (SSH) from your IP range or CIDR block
- Open additional ports as needed for your application (e.g., 443 for HTTPS, 5432 for PostgreSQL)
- Restrict SSH access to known IP ranges; avoid 0.0.0.0/0
- FIPS mode enforces TLS 1.2+ for all encrypted connections
Known Limitations
- Ed25519 SSH keys are not FIPS-approved and will not work. Use ECDSA or RSA keys. AWS-generated key pairs (RSA) work by default.
- SSM Agent is not pre-installed. Rocky Linux 9 does not include SSM Agent in its default repositories. See the AWS documentation for installation: https://docs.aws.amazon.com/systems-manager/latest/userguide/agent-install-rocky.html
- MD5, SHA-1, DES, RC4, and Blowfish are disabled system-wide. Applications that depend on these algorithms will not work without reconfiguration.
Target Use Cases
- FedRAMP and FISMA environments
- HIPAA-regulated workloads
- PCI-DSS compliant systems
- NIST 800-171 compliance
- Any workload requiring FIPS-approved cryptography
Free to Use
No software charges. Pay only for AWS infrastructure (EC2, EBS, data transfer).
Rocky Linux is a registered trademark of The Rocky Enterprise Software Foundation. This product is not affiliated with or endorsed by The Rocky Enterprise Software Foundation.
Highlights
- FIPS Mode Enabled: Kernel-level FIPS mode active at boot. All system cryptography restricted to FIPS-approved algorithms. Ed25519 SSH keys not supported; use ECDSA or RSA.
- Tested Workloads: Every release tested with PostgreSQL, Nginx, Python, Java, Node.js, Go, and Podman under FIPS. Real-world applications work correctly with FIPS-approved cryptography.
- Free to Use: No software charges. Production-ready FIPS AMI with documentation included. Pay only for AWS infrastructure costs.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
This product is free. There are no software charges. AWS infrastructure charges (EC2, EBS, data transfer) are billed directly by AWS and are subject to AWS's refund policies.
For product support or questions, contact: support@ironsmith.io
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Rocky Linux 9 FIPS - v9.7.20260219.0
Additional details
Usage instructions
Launching the AMI
Option 1: Terraform Module (Recommended)
Use our official module on the Terraform Registry: ironsmith-io/ec2-rocky9-fips/aws https://registry.terraform.io/modules/ironsmith-io/ec2-rocky9-fips/aws
Option 2: AWS Console / CLI
- Launch the AMI from AWS Marketplace using 1-Click or EC2 Console
- Select your desired instance type (t3.micro is free tier eligible)
- Configure VPC, subnet, and security group
- Select or create an EC2 key pair for SSH access
- Launch the instance
Connecting to Your Instance
- Default user: rocky
- SSH port: 22
- Authentication: Key-based only (passwords disabled)
IMPORTANT: FIPS mode requires FIPS-approved SSH key types. Ed25519 keys will NOT work. Use ECDSA or RSA:
ssh-keygen -t ecdsa -b 384 -f ~/.ssh/id_ecdsa_fipsEC2 key pairs created by AWS (RSA) work without changes.
Verifying FIPS
- Verify FIPS mode: fips-mode-setup --check
- Check kernel flag: cat /proc/sys/crypto/fips_enabled (should return 1)
- Check crypto policy: update-crypto-policies --show (should return FIPS)
- Confirm MD5 blocked: echo test | openssl dgst -md5 (should fail)
Known Limitations
- Ed25519 SSH keys are not supported (use ECDSA or RSA)
- MD5, SHA-1, DES, RC4, and Blowfish are disabled system-wide
- This AMI has FIPS mode enabled; it is not CMVP validated
- No CIS hardening included (see Rocky Linux 9 FIPS + CIS Hardened AMI)
- No GUI or desktop environment
- SSM Agent not pre-installed. Rocky Linux 9 does not include it in default repos. See the AWS documentation for installation: https://docs.aws.amazon.com/systems-manager/latest/userguide/agent-install-rocky.html
- After kernel updates, verify FIPS is still active: cat /proc/sys/crypto/fips_enabled
Documentation Location
Documentation is at /usr/share/doc/ironsmith/rocky9-fips/ including:
- README.md - Quick start guide
- AUDITOR-VERIFY.md - Compliance evidence and auditor guidance
- BUILD-INFO.json - Build metadata and AMI lineage
- ironsmith - FIPS verification CLI tool (run 'sudo ironsmith' or 'ironsmith --help')
Support
Vendor support
Technical support for AMI defects and security issues is available through email. Documentation is included on the AMI at /usr/share/doc/ironsmith/rocky9-fips/. Run 'sudo ironsmith' for runtime FIPS verification.
Support Email: support@ironsmith.io
Support Hours: Business hours (US Pacific, Mon-Fri) Response Time: 1-2 business days
Included:
- Bug reports and AMI defects
- Security updates (via new AMI versions)
Not Included:
- Application configuration or troubleshooting
- Compliance consulting or audit preparation
- Custom builds or dedicated support
For dedicated support, consulting, or custom FIPS builds, contact sales@ironsmith.io .
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.