FIPS Compliance Requirements Overview (2024)

What are the requirements for FIPS compliance, and how do FIPS, NIST, and FISMA relate? We’ve covered all the important points for a complete FIPS overview.

What does FIPS stand for? FIPS stands for Federal Information Processing Standards, and it is a program overseen by NIST and the Department of Commerce that requires specific security standards for data and encryption.

FIPS Compliance Requirements Overview (1)

What Are FIPS and Why Are They Important for Cybersecurity?

Federal Information Processing Standards (FIPS) are security standards for federal and defense cybersecurity compliance, specifically focusing on data encryption.

Encryption is a necessary part of almost every cybersecurity compliance framework, including the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF), and it is no different for government agencies and their contractors. Encryption, including email encryption, protects data from unauthorized viewing either at rest or in transit and serves as one of the major bulwarks against data theft.

Organizations implementing encryption should not use outdated or compromised algorithms that fail to protect data meaningfully. To support modern, effective encryption for protected data under use by government agencies, and even private organizations, the U.S. government distributed these standards for public use. These standards focus on several different topic areas, primarily encryption and cryptography, and are overseen by the National Institute of Standards and Technology (NIST). These regulations serve an essential purpose of filling gaps for encryption standards when no acceptable industry standards exist for a particular application.

Are these regulations always required for government agencies? Not necessarily. Some federal compliance standards will not include any processing standards, while others may include several. Additionally, these standards are available for use by anyone, and often private organizations adopt these standards above and beyond their own industry compliance requirements.

FIPS Compliance Requirements Overview (3)

Kiteworks touts a long list of compliance and certification achievements.

Who Needs to Be FIPS Compliant?

Organizations or companies that must follow the Federal Information Processing Standards (FIPS) are typically those that handle confidential or sensitive data. This includes federal agencies, institutions that receive federal funding, and private sector organizations that must comply with specific regulations, such as the Health Insurance Portability and Accountability Act (HIPAA). Other organizations may benefit from FIPS compliance, such as those that handle personal information, banks, healthcare organizations, and financial institutions.

What Does It Mean to Be FIPS Compliant?

FIPS compliance means a product meets all the necessary security requirements established by the U.S. government for protecting sensitive information. To be FIPS-compliant, a product must adhere to rigid standards, pass rigorous testing, and be certified by NIST.

What Are Current FIPS Standards?

There are several updated FIPS in practice today. These FIPS cover different encryption standards and can be used together or individually to shore up encryption standards or as part of larger compliance frameworks.

Some of the current FIPS in practice right now include the following:

FIPS 140-2

Initially published in 2001, FIPS 140-2 is perhaps one of the more widespread implementations of cryptographic controls. It defines appropriate levels of cryptography to protect federal data and assure that cryptographic modules produced by private organizations can meet those levels of protection. Furthermore, FIPS 140-2 breaks down cryptographic security into four distinct levels, each with increasing privacy, data isolation, and management controls. This standard does not refer to specific encryption algorithms but, due to evolving security challenges, an appropriate encryption algorithm would need to meet the criteria in the document. Currently, AES-128, AES-192, and AES-256 all meet standards.

Often, documents refer to FIPS 140-2 compliance. This does not refer to an organization being compliant, but rather the cryptography an organization has implemented as part of its products or systems.

How Do You Become Compliant With FIPS 140-2?

To become compliant with FIPS 140-2, organizations must employ cryptography-based security products and services that have been validated as compliant with the specific requirements outlined by NIST. This includes purchased products and services, as well as any in-house developed solutions. To become compliant, organizations must also maintain effective security policies and procedures, and use only approved cryptographic algorithms and approved cryptographic keys. Lastly, they must also follow applicable government regulations and laws that may be applicable to their specific industries.

Recently, FIPS 140-3 was approved. However, it is still being implemented in government settings, and as such, FIPS 140-2 is still the standard most referenced by compliance documents.

FIPS 180-4

FIPS 180-4, originally published in 2008 and recently updated in 2015, specifies appropriate hash algorithms to develop digests of messages. In cryptography, a “digest” is an alphanumeric string created by hashing a piece of information. This digest is unique to the content in question and will only change if the core content changes. These digests are a critical part of ensuring the integrity of transmitted information.

FIPS 186-4

Published in 2013, FIPS 186-4 defines a suite of algorithms for developing digital signatures. Much like hashing, digital signatures can help authenticate that data has not been modified. Furthermore, signatures can also be used to verify the identity of the sender. This publication defines signature algorithms using three techniques: Digital Security Algorithm (DSA), Elliptic Curve Digital Signature Algorithm (ECDSA), and Rivest–Shamir–Adleman (RSA).

FIPS 197

FIPS 197 defines the Advanced Encryption Standard (AES). AES uses symmetric block cipher techniques for encryption with the capability of generating cryptographic keys of various sizes (128, 192, and 256 bits). Larger cryptographic keys correspond to more complex encryption standards. AES encryption standards are considered FIPS 140-2 compliant and more than suitable for many private sector compliance requirements.

FIPS 198-1

Published in 2008, FIPS 198-1 defines a hash key authentication method using shared secret keys called message authentication codes alongside cryptographic hash functions called hash message authentication codes.

FIPS 199

FIPS 199 is a 2004 publication that defines how IT experts and technology leaders should organize federal systems based on their relative levels of required confidentiality, integrity, and availability. The impact levels define how critical the information contained in these systems is and how damaging the loss of that data would be to agencies and constituents. FIPS 199 breaks information systems into low, moderate, and high impact levels, each with increasing security requirements. Other frameworks, namely FedRAMP, rely on FIPS 199 for their own compliance and security level designations.

FIPS 200

FIPS 200 is a 2006 publication that superseded SP 800-26 and defines minimum security requirements for government agencies under the Information Technology Management Reform Act of 1996 (FISMA). It serves as a cornerstone, along with NIST SP 800-53, for national cybersecurity, including the Cybersecurity Framework (CSF) and the Risk Management Framework.

FIPS 201-2

Released in 2013, FIPS 201-2 is a set of standards used to verify the identities of federal employees and contractors. Identification and authentication are challenging practices, and this document introduces requirements for practices like physical identification, biometric authentication, and identity proofing. It also contains standards (or refers to outside standards) for practices like securing authentication information.

FIPS 202

FIPS 202 defines Secure Hash Algorithm 3 for hashing, digital signatures, and other cryptographic applications. This hash algorithm supplements the Secure Hash Algorithms outlined in FIPS 180-4 to support strong information authentication and integrity maintenance.

These rules are not set in stone. As technology evolves and new security challenges arise, standards are often withdrawn, revised, and replaced with more advanced standards. For example, FIPS 46-3 (Data Encryption Standard) was withdrawn in 2005 because it no longer met the minimum requirements expected in federal security. As publications are withdrawn, new ones are typically added to address the limitations.

What’s the Difference Between FIPS 140-2 and FIPS 197?

FIPS 140-2 is the standard for cryptographic modules established by NIST. It establishes the security requirements that must be met for a cryptographic module to be certified for use in certain secure applications. FIPS 197 by contrast is the specific standard for the Advanced Encryption Standard (AES), setting out the standard for the encryption and decryption of electronic data using the AES algorithm. It is a subset of FIPS 140-2, used to specify only one type of cipher and its associated parameters.

What Are FIPS Compliance Requirements?

The truth is that compliance can mean a lot of different things, and these things can change over time. More often than not, any compliance frameworks with specific encryption standards will refer to a publication. For example, almost all government compliance standards include one or more requirements (often FIPS 140-2 and some include FIPS 199) to help define different levels of compliance.

Compliance often only applies to certain parts of a compliance framework. An organization may never actually worry about compliance for itself, but it may look for technology vendors or products that adhere to some specifications. For example, a business in an industry that requires certain types of encryption may purchase and use FIPS 140-2 compliant products and services.

FIPS Compliant vs. FIPS Certified

FIPS compliant means that a product or system meets the requirements outlined in a FIPS publication. The manufacturer of the product or system has declared that their product or system meets the FIPS standards. However, no independent testing or verification is required for a product or system to claim FIPS compliance.

FIPS certified, by contrast, means that a product or system has undergone independent testing and verification by a NIST-accredited testing laboratory. If the product or system meets all the requirements outlined in a FIPS publication, it can be certified by NIST as compliant. Therefore, FIPS certification provides a higher level of assurance that a product or system meets the FIPS standards.

Consider FIPS Compliance and Compliant Technology

FIPS is not just for government agencies. The techniques and technologies outlined in these documents are useful for private organizations as well. Many choose to follow guidelines to offer clients strong technology or IT infrastructure to protect customer data.

Check out more about Kiteworks and FIPS compliance. To learn more about how Kiteworks is FIPS compliant and provides comprehensive governance for content moving into, within, and out of your organization, schedule a demo.



FIPS Compliance Requirements Overview (2024)

FAQs

What is compliance with the FIPS standards is required? ›

FIPS compliance means a product meets all the necessary security requirements established by the U.S. government for protecting sensitive information. To be FIPS-compliant, a product must adhere to rigid standards, pass rigorous testing, and be certified by NIST.

How to determine FIPS 140-2 compliance? ›

The easiest way to determine if your CSP is FIPS 140-2 certified is to check the NIST Cryptographic Module Validation Program (CMVP) website. Click here to search for a company's name in NIST's Validated Modules database.

What are the 4 levels of FIPS? ›

Definitions: A metric of the security provided by a cryptographic module that is specified as Level 1, 2, 3, or 4, as specified in [FIPS 140], where Level 1 is the lowest level, and Level 4 is the highest level.

How do I disable requirement for FIPS-compliant algorithms for encryption? ›

In Security Settings, expand Local Policies, and then click Security Options. Under Policy in the right pane, double-click System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing, and then click Disabled. This change takes effect after the local security policy is re-applied.

What is an example of FIPS? ›

Examples of FIPS standards include FIPS 140-2, which defines the requirements for cryptographic modules used in protecting sensitive information, and FIPS 199, which provides guidance on categorizing information and information systems based on the potential impact of a security breach.

What is FIPS and do I need it? ›

The Federal Information Protection Standard, or FIPS, is one of these standards. These standards were created by the National Institute of Science and Technology (NIST) to protect government data, and ensure those working with the government comply with certain safety standards before they have access to data.

What is FIPS Common Criteria? ›

FIPS and Common Criteria are the main governing standards regarding information technology and product security across the globe, with many levels of complexity and depth that can be confusing to many.

What is FIPS compliance vs certified? ›

But FIPS compliance does not extend as far as certification. Demonstrating FIPS compliance means that only parts of the product may meet the FIPS guidelines and the system has not been tested as a whole.

What is the difference between NIST and FIPS? ›

The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer situs of non-military United States government agencies and contractors.

How to check if FIPS compliance is enabled? ›

Look at the “Enabled” value in the right pane. If it's set to “0”, FIPS mode is disabled. If it's set to “1”, FIPS mode is enabled.

What happens if I disable FIPS? ›

If FIPS is enabled, Windows can only use FIPS-validated encryption and advises all applications to do so as well. Other encryption schemes are blocked, even if they are newer, faster, and more secure. Because of this, disabling the FIPS mode will not cause any security issues.

How do I make my computer FIPS-compliant? ›

If your Active Directory forest meets the minimum requirements and you have configured the Windows environment with the local or group “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” security policy, you can make Centrifymanaged computers FIPS-compliant by enabling and applying ...

Should I enable FIPS compliance? ›

Windows has a hidden setting that will enable only government-certified "FIPS-compliant" encryption. It may sound like a way to boost your PC's security, but it isn't. You shouldn't enable this setting unless you work in government or need to test how software will behave on government PCs.

What are the FIPS processing standards? ›

The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer situs of non-military United States government agencies and contractors.

What does the FIPS code stand for? ›

The Federal Information Processing Standard (FIPS) code (FIPS 6-4) uniquely identifies counties and county equivalents in the United States.

Top Articles
8 Real Ways to Make Money with Amazon
How The Gig Economy Impacts Taxes
7 C's of Communication | The Effective Communication Checklist
Kreme Delite Menu
Camera instructions (NEW)
Television Archive News Search Service
Week 2 Defense (DEF) Streamers, Starters & Rankings: 2024 Fantasy Tiers, Rankings
Tj Nails Victoria Tx
From Algeria to Uzbekistan-These Are the Top Baby Names Around the World
Snarky Tea Net Worth 2022
Mndot Road Closures
Our History | Lilly Grove Missionary Baptist Church - Houston, TX
Hover Racer Drive Watchdocumentaries
A Fashion Lover's Guide To Copenhagen
414-290-5379
shopping.drugsourceinc.com/imperial | Imperial Health TX AZ
Lantana Blocc Compton Crips
Select Truck Greensboro
Mycarolinas Login
Blog:Vyond-styled rants -- List of nicknames (blog edition) (TouhouWonder version)
Betonnen afdekplaten (schoorsteenplaten) ter voorkoming van lekkage schoorsteen. - HeBlad
Colts Snap Counts
ᐅ Bosch Aero Twin A 863 S Scheibenwischer
State HOF Adds 25 More Players
Les Rainwater Auto Sales
Jenn Pellegrino Photos
Dirt Removal in Burnet, TX ~ Instant Upfront Pricing
Conan Exiles: Nahrung und Trinken finden und herstellen
Zoe Mintz Adam Duritz
Www.craigslist.com Austin Tx
Wiseloan Login
Kirk Franklin Mother Debra Jones Age
How to Use Craigslist (with Pictures) - wikiHow
Pfcu Chestnut Street
Gridwords Factoring 1 Answers Pdf
123Moviestvme
2012 Street Glide Blue Book Value
Pinellas Fire Active Calls
Shih Tzu dogs for sale in Ireland
Property Skipper Bermuda
Walgreens Agrees to Pay $106.8M to Resolve Allegations It Billed the Government for Prescriptions Never Dispensed
Flags Half Staff Today Wisconsin
Mytime Maple Grove Hospital
Low Tide In Twilight Manga Chapter 53
Doublelist Paducah Ky
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
John M. Oakey & Son Funeral Home And Crematory Obituaries
Top 1,000 Girl Names for Your Baby Girl in 2024 | Pampers
Theater X Orange Heights Florida
Abigail Cordova Murder
Morgan State University Receives $20.9 Million NIH/NIMHD Grant to Expand Groundbreaking Research on Urban Health Disparities
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6196

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.