CMMC Compliance: What Is FIPS-Validated Cryptography?  (2024)

As you try to make sense of the Cybersecurity Maturity Model Certification, you’ll come across all kinds of obscure technical terms. For example: What is FIPS-Validated Cryptography? What does it have to do with CMMC? Follow along to discover the answers.

What Is FIPS?

FIPS stands for Federal Information Processing Standards, a set of data security standards developed by the U.S. government to be used by non-military agencies or government contractors.

There are many different FIPS publications out there, with each one outlining standards for specific aspects of data security, such as:

  1. Personal Identity Verification (PIV)
  2. Digital signature standards
  3. Security requirements for federal information systems

CMMC Compliance: What Is FIPS-Validated Cryptography? (1)

FIPS Publication 140-2, “Security Requirements for Cryptographic Modules”, for example, deals with cryptography, defined as the use of mathematical techniques to prevent data from being read by unauthorized parties.

FIPS Publication 140-2 establishes four increasing levels of cryptographic security with specific technical requirements for a wide range of areas, including:

  1. Cryptographic module specification
  2. Cryptographic module ports and interfaces
  3. Roles, services, and authentication
  4. Finite state model
  5. Physical security
  6. Operational environment
  7. Cryptographic key management
  8. EMI/ENC
  9. Self-tests
  10. Design assurance
  11. Mitigation of other attacks

What Is FIPS-Validated Cryptography?

The term “FIPS-validated cryptography” refers to a cryptographic module validated to meet the technical requirements outlined by FIPS.

A cryptographic module, in turn, is the set of hardware and software that implements functions such as cryptographic algorithms and key generation methods.

So, for example, the term “cryptographic module” can refer to encryption software or to the physical circuitry a router (or other similar device) uses to encrypt data.

Cryptographic modules are validated to meet FIPS requirements by the Cryptographic Module Validation Program (CMVP), a joint effort between the National Institute of Standards and Technology (NIST) and the Canadian Centre for Cyber Security.

Note that as a prerequisite to CMVP validation, cryptographic modules are required to use a cryptographic algorithm that has successfully passed validation testing by the Cryptographic Algorithm Validation Program (CAVP).

dt_gap height=”20″ /]

Contact our CMMC Registered Practitioners Today

FIPS-Validated vs FIPS-Compliant

Adding to the confusion of defense contractors, some products or software are advertised as FIPS-validated while others are presented as FIPS-Compliant. What is the difference?

These are two different categories that are NOT interchangeable:

  1. FIPS-Validated products have undergone testing by an accredited national laboratory.
  2. FIPS-Compliant products contain FIPS-Validated components, although the product as a whole hasn’t received FIPS validation.

As we’ll see in greater detail in the next section, CMMC compliance entails using cryptographic products that are FIPS-validated.

You can use this search form to check if a module has received validation.

Here’s a list of the cryptographic modules whose CMVP validation is in process.

So What Does FIPS-Validated Cryptography Have To Do With CMMC?

FIPS-validated cryptography matters if you want to achieve CMMC compliance because the National Institute of Standards and Technology (and by extension the Cybersecurity Maturity Model Certification) sees non-validated cryptographic modules as providing NO data protection.

While CMMC Level 1 doesn’t include a FIPS validation requirement for cryptography, the practice “CUI Encryption” of CMMC Level 2 (under the domain “Systems and Communication Protection”) mandates to “Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.”

It makes sense: the main goal of CMMC is to protect Controlled Unclassified Information (CUI), and one of the most effective ways to protect any kind of data is by using cryptography.

And although all the above sounds straightforward enough, FIPS-validated cryptography is one of the aspects of CMMC compliance that causes more headaches among DoD contractors.

If you have questions about FIPS-validated cryptography or about any other area of CMMC compliance, don’t hesitate to contact our CMMC Registered Practitioners. We stand ready to offer assistance and answer all your questions.

Need To Achieve CMMC Compliance? We Are Here To Help

Whether it’s CMMC, NIST 800-171, DFARS, or ITAR, we help organizations achieve compliance with all applicable cybersecurity regulations at any level so that they can win and maintain Department of Defense (DoD) contracts.

Brea Networks, LLC is a fully Registered Provider Organization (RPO) and is a Microsoft partner with full Microsoft GCC High licensing and migration solutions.

Contact our CMMC Registered Practitioners today by clicking here.

Brea Networks, LLC / CMMC Compliance

451 W. Lambert Rd Suite 214

Brea, CA 92821

Tel: (714) 592-0063

Photo sources- Header: https://cmmccompliance.us/; graphic: @USArmy, link to license

Disclaimer: “The appearance of U.S. Department of Defense (DoD) visual information does not imply or constitute DoD endorsem*nt.”

CMMC Compliance: What Is FIPS-Validated Cryptography?  (2024)
Top Articles
Overview, Consequences & Impact, Causes
What is FPS and How Can You Optimise Your PC for Gaming?
Sprinter Tyrone's Unblocked Games
Wisconsin Women's Volleyball Team Leaked Pictures
Alan Miller Jewelers Oregon Ohio
Aadya Bazaar
Mileage To Walmart
Otterbrook Goldens
Kostenlose Games: Die besten Free to play Spiele 2024 - Update mit einem legendären Shooter
Citi Card Thomas Rhett Presale
Alaska Bücher in der richtigen Reihenfolge
LeBron James comes out on fire, scores first 16 points for Cavaliers in Game 2 vs. Pacers
Walgreens On Nacogdoches And O'connor
Little Rock Arkansas Craigslist
Culvers Tartar Sauce
Skylar Vox Bra Size
Watch TV shows online - JustWatch
The Murdoch succession drama kicks off this week. Here's everything you need to know
24 Hour Walmart Detroit Mi
Bcbs Prefix List Phone Numbers
Letter F Logos - 178+ Best Letter F Logo Ideas. Free Letter F Logo Maker. | 99designs
979-200-6466
Driving Directions To Bed Bath & Beyond
Nhl Tankathon Mock Draft
Tu Pulga Online Utah
Uncovering The Mystery Behind Crazyjamjam Fanfix Leaked
Disputes over ESPN, Disney and DirecTV go to the heart of TV's existential problems
Myql Loan Login
Hwy 57 Nursery Michie Tn
Jackass Golf Cart Gif
Redding Activity Partners
Syracuse Jr High Home Page
Of An Age Showtimes Near Alamo Drafthouse Sloans Lake
Craigslist Albany Ny Garage Sales
Staar English 1 April 2022 Answer Key
دانلود سریال خاندان اژدها دیجی موویز
How are you feeling? Vocabulary & expressions to answer this common question!
Evil Dead Rise (2023) | Film, Trailer, Kritik
2007 Peterbilt 387 Fuse Box Diagram
Firestone Batteries Prices
How I Passed the AZ-900 Microsoft Azure Fundamentals Exam
Gas Buddy Il
White County
Random Animal Hybrid Generator Wheel
Movie Hax
Minecraft: Piglin Trade List (What Can You Get & How)
Shannon Sharpe Pointing Gif
Billings City Landfill Hours
Fahrpläne, Preise und Anbieter von Bookaway
Provincial Freeman (Toronto and Chatham, ON: Mary Ann Shadd Cary (October 9, 1823 – June 5, 1893)), November 3, 1855, p. 1
Dinargurus
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 5730

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.