Ensuring FIPS 140-2 Compliance Inside - Caveat Emptor | PreVeil (2024)

  • Blog

Share This

How to know if your vendor is complying with NIST standards for FIPS 140-2

Defense contractors looking to comply with NIST 800-171 know they need to protect all Controlled Unclassified Information (CUI) both at rest and in transit with FIPS 140-2 validated encryption. And this requirement can extend to not just CUI in contracts but also to all the technology and services they use. Given that CUI represents sensitive defense information, contractors should realize the importance of properly using FIPS 140-2 encryption algorithms, which are the benchmark for effective cryptographic hardware and software. Importantly, contractors need to know how to determine if their vendors have properly implemented FIPS 140-2 algorithms.

Ensuring FIPS 140-2 Compliance Inside - Caveat Emptor | PreVeil (2)

How to tell if it’s real FIPS 140-2

The easiest way to determine if your vendor is FIPS 140-2 certified is to check the NIST website. If a company’s name appears in NIST’s Cryptographic Module Validation Program (CMVP), they have been vetted by NIST and you should feel comfortable using the vendor’s technology.

Achieving the NIST standard is no easy feat. Vendors can take up to 18 months to complete the necessary three-step program where each step must be done in order and cannot be started until the previous one is completed. To pass, vendors must:

  • #1 Document all cryptographic methods and algorithms implemented against the NIST standard. Any gaps in the vendor’s implementation must be filled either by creating necessary code or documentation.
  • #2 Participate in the NIST Cryptographic Algorithm Validation Program (CAVP) where a NIST lab tests and evaluates the algorithms implemented in the vendor’s code. Each algorithm that passes will receive a CAVP certificate from NIST.
  • #3 Have NIST test and evaluate the cryptographic module from end to end including the documentation and the CAVP-certified algorithms that are used in the module itself. When the testing is complete and approved, NIST issues a CMVP certificate for the validated cryptographic module.

  • Only after this third step can a vendor truthfully claim that they are using FIPS 140-2 validated cryptographic methods and algorithms.

    What about “FIPS Inside”

    Some vendors will state they comply with FIPS 140-2 standard without undergoing certification. They will promote what is commonly called a ‘FIPS Inside’ justification which means they implement FIPS-approved crypto libraries or use FIPS-approved algorithms in their solutions but their implementation has never been vetted by NIST itself.

    While it’s possible to meet the NIST standard for FIPS without having NIST evaluate the entire process, it’s very tricky to determine the implementation’s validity. A contractor would have to examine numerous details of a vendor’s code and ensure all algorithms and modules are meeting the FIPS 140-2 requirements.

    In addition, the contractor would need to validate methods that are frequently invisible to contractors such as self-tests, service access controls, error handling, entropy tests, and many other features beyond the encryption algorithms themselves. And this testing is not easy to do.

    Best advice is to be wary of vendors whose claim to meeting the FIPS 140-2 standard is based on self-attestation as its very tricky to determine the statement’s accuracy.

    FIPS certification enables confidence in your cybersecurity

    If a vendor has been verified for use of FIPS 140-2 algorithms and the module that uses them, they have met a very high bar for their cryptography. At PreVeil, for example, it took us over a year to accomplish the three steps required to become properly evaluated and validated by NIST and ensure we meet FIPS 140-2 requirements. For PreVeil, the validation extends not just to the PreVeil encryption algorithms, but also includes all the details of the end-to-end cryptographic implementation.

    Contractors should be confident that vendors meeting the FIPS 140-2 standard are providing the highest level of cryptographic methods and algorithms.

    Conclusion

    The benefit to customers of relying on vendors who use FIPS 140-2 validated cryptography is evident. But additional benefits are also ensured because by relying on the NIST standard, contractors can be assured that vendors are constantly reviewing and updating their cryptographic system in accordance with NIST requirements. The FIPS 140-2 standard ensures contractors CUI is protected not just today, but in the many years to come.

Ensuring FIPS 140-2 Compliance Inside - Caveat Emptor | PreVeil (2024)

FAQs

How to validate FIPS 140-2 compliance? ›

To pass, vendors must:
  1. Document all cryptographic methods and algorithms implemented against the FIPS 140-2 standard. ...
  2. Participate in the NIST Cryptographic Algorithm Validation Program (CAVP) where an independent NIST-approved lab tests and evaluates the algorithms implemented in the vendor's code.
Mar 20, 2024

What is FIPS 140 Level 2 compliance? ›

FIPS 140-2 Level 2- Level 2 raises the bar slightly, requiring all of level 1's requirements along with role-based authentication and tamper evident physical devices to be used. It should also be run on an Operating System that has been approved by Common Criteria at EAL2.

What is the problem with FIPS 140-2? ›

FIPS 140-2 is an old standard that doesn't deal well with modern systems and especially doesn't fit nicely with software implementations. It is very focused on standalone hardware devices, and plugin hardware security modules or similar physical devices.

What is the FIPS compliance mandate? ›

FIPS compliance means a product meets all the necessary security requirements established by the U.S. government for protecting sensitive information. To be FIPS-compliant, a product must adhere to rigid standards, pass rigorous testing, and be certified by NIST.

What is the difference between FIPS compliance and validation? ›

Key Differences Between FIPS Compliance and FIPS Validation

FIPS compliance relies on self-declaration by the organization responsible for the product, whereas FIPS validation involves a third-party evaluation by a NIST-accredited laboratory.

What are the Level 3 requirements for FIPS 140-2? ›

Level 3: Adds requirements for physical tamper-resistance and identity-based authentication. There must also be physical or logical separation between the interfaces by which “critical security parameters” enter and leave the module. Private keys can only enter or leave in encrypted form.

Should I enable FIPS compliance? ›

Windows has a hidden setting that will enable only government-certified "FIPS-compliant" encryption. It may sound like a way to boost your PC's security, but it isn't. You shouldn't enable this setting unless you work in government or need to test how software will behave on government PCs.

What security functions are approved by FIPS 140-2? ›

Annex A provides a list of the approved security functions applicable to FIPS 140-2. The categories include transitions, symmetric key encryption and decryption, digital signatures, message authentication and hashing.

Why is FIPS bad? ›

Also, it will actually tend to weaken security. This is because the FIPs approved algorithm list is several years old which means that the system is forced to use ciphers which are weaker than modern defaults. Furthermore, FIPS-certified code can't, if you read carefully, be patched without re-certification.

What encryption algorithms is FIPS 140-2 compliant? ›

AES, DES/3DES, RC2, RC4, SHA-1/224/256/384/512, DSA, ECDSA algorithms are approved for use at each level. AES, DES/3DES, RC2, RC4, SHA-1/224/256/384/512, DSA, ECDSA algorithms are approved for use at this level.

What is the difference between NIST and FIPS? ›

The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer situs of non-military United States government agencies and contractors.

How to determine FIPS 140-2 compliance? ›

To comply with FIPS 140-2, your system must be configured to run in a FIPS approved mode of operation, which includes ensuring that a cryptographic module uses only FIPS-approved algorithms. For more information on configuring systems to be compliant, see the Windows and Windows Server FIPS 140-2 content.

Who certifies FIPS compliance? ›

To achieve FIPS 140-2 validation or certification, all components of a security solution, including both hardware and software, must undergo testing and approval by one of the NIST-accredited independent laboratories.

Does Hipaa require FIPS 140-2? ›

Yes, HIPAA requires encryption of protected health information (PHI) and electronic PHI (ePHI), though there are certain exceptions. The National Institute of Standards and Technology (NIST) recommends protecting PHI data with FIPS 140 approved encryption.

Is AES 256 FIPS 140-2 Validated? ›

AES encryption is compliant with FIPS 140-2. It's a symmetric encryption algorithm that uses cryptographic key lengths of 128, 192, and 256 bits to encrypt and decrypt a module's sensitive information. AES algorithms are notoriously difficult to crack, with longer key lengths offering additional protection.

Is Microsoft authenticator FIPS 140-2 compliant? ›

Microsoft Authenticator on Android is currently pending FIPS compliance certification to support our customers that may require FIPS validated cryptography. The Microsoft Authenticator app on iOS is already FIPS-140 compliant, as announced in December of 2022.

What is FIPS 140-2 validated HSM? ›

(Federal Information Processing Standard) FIPS 140-2 Level 3 certified HSMs are designed to prevent physical tampering with tamper-evident seals, intrusion sensors, and self-destruct mechanisms. These devices meet the requirements of Level 3 of the FIPS 140-2 standard.

Top Articles
How much is 6,000 Amex Points Worth?
How much is 1,000 Amex Points Worth?
Chs.mywork
NYT Mini Crossword today: puzzle answers for Tuesday, September 17 | Digital Trends
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Http://N14.Ultipro.com
Phone Number For Walmart Automotive Department
Chalupp's Pizza Taos Menu
Zitobox 5000 Free Coins 2023
Www Thechristhospital Billpay
Mivf Mdcalc
Ktbs Payroll Login
4Chan Louisville
Obituary | Shawn Alexander | Russell Funeral Home, Inc.
Yesteryear Autos Slang
Rosemary Beach, Panama City Beach, FL Real Estate & Homes for Sale | realtor.com®
Premier Reward Token Rs3
Salem Oregon Costco Gas Prices
The Pretty Kitty Tanglewood
Shopmonsterus Reviews
Shiftselect Carolinas
Maxpreps Field Hockey
A Person That Creates Movie Basis Figgerits
Papa Johns Mear Me
New Stores Coming To Canton Ohio 2022
Goodwill Of Central Iowa Outlet Des Moines Photos
Wku Lpn To Rn
Craigslist Fort Smith Ar Personals
The Collective - Upscale Downtown Milwaukee Hair Salon
Cfv Mychart
Bend Missed Connections
Housing Assistance Rental Assistance Program RAP
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Save on Games, Flamingo, Toys Games & Novelties
Nacho Libre Baptized Gif
Whitehall Preparatory And Fitness Academy Calendar
20+ Best Things To Do In Oceanside California
Frcp 47
Daly City Building Division
Citibank Branch Locations In Orlando Florida
888-822-3743
Pathfinder Wrath Of The Righteous Tiefling Traitor
Petra Gorski Obituary (2024)
Elven Steel Ore Sun Haven
CrossFit 101
The Sports Academy - 101 Glenwest Drive, Glen Carbon, Illinois 62034 - Guide
House For Sale On Trulia
La Fitness Oxford Valley Class Schedule
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 6604

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.