What is FIPS 140-2 and Why it's Important (2024)

Table of Contents
Author Related Blog FAQs

By: Orlee Berlove, reviewed by Gregg Laroche

FIPS 140-2, Security Requirements for Cryptographic Modules, specifies security standards that must be met when encryption is used to protect sensitive government data, including Controlled Unclassified Information (CUI). But meeting FIPS 140-2’s exacting requirements for encryption is difficult for contractors, as the process to implement and then prove FIPS 140-2 compliance is lengthy and demanding.

FIPS stands for Federal Information Processing Standards. The National Institute of Standards (NIST) requires implementation of FIPS standards so that cybersecurity levels are consistent across federal agencies and the non-government contractors they work with.

This blog explains the importance of compliance with FIPS 140-2 for defense contractors, given that it’s a key component of DFARS, NIST and CMMC requirements. The blog also outlines what it takes to meet FIPS 140-2 standards, and how to be certain that your Cloud Service Provider (CSP), assuming you use one, is FIPS 140-2 certified.

What is FIPS 140-2 and Why it's Important (1)

Why it matters: FIPS 140-2 Validation is Required to Meet NIST 800-171

If your organization handles CUI and employs encryption to protect it, you’ll need to ensure that either your encryption modules, or those deployed by your CSP if you use one, meet FIPS 140-2 standards.

That’s because all defense contractors that handle CUI have a DFARS 252.204-7012 clause in their contract. DFARS 7012 requires compliance with NIST 800-171, which was written to protect CUI and invokes the FIPS 140-2 requirement.

NIST 800-171 has 110 security controls that defense contractors that handle CUI need to implement. Control 3.13.11 states that contractors must:

[E]mploy FIPS-validated cryptography when [cryptography is] used to protect the confidentiality of CUI.

And several controls point toward the use of cryptography, which means that control 3.13.11 would be applicable. For example: control 3.13.8 calls for the use of cryptographic mechanisms to protect CUI during transmission unless otherwise protected by alternative physical safeguards, and control 3.1.13 calls for employment of cryptographic mechanisms to protect the confidentiality of remote access sessions.

Note that if encryption is used FIPS 140-2 validation is required. That requirement applies regardless of whether the device handling CUI is a desktop or a mobile device. It doesn’t matter if you’re looking at peripheral devices or endpoints. It doesn’t matter if the CUI is in the form of files or individual documents, images or text.

Why it matters: NIST 800-171 compliance is required for CMMC Level 2 certification

CMMC (Cybersecurity Maturity Model Certification) is the DoD’s new program to verify defense contractors’ compliance with DoD security requirements for the protection of sensitive information. The vast majority of organizations that handle CUI will need to achieve CMMC Level 2, which requires independent third-party assessments of compliance rather than self-assessments (as has been permitted by NIST 800-171). Level 2’s security controls are in complete alignment with the 110 security controls of NIST 800-171.

To learn more about CMMC, see PreVeil’s brief, Complying with the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC), which has been downloaded by more than 4,000 defense contractors.

The CMMC program is currently in its final stages of the federal rulemaking process and CMMC requirements are expected to begin to appear in defense contracts in late 2024. In the meantime, the DoD has offered Joint Surveillance Voluntary Assessments (JSVAs) to help defense contractors that want to get a jump on meeting CMMC requirements. JSVA assessments are based on CMMC Level 2 requirements, which mirror NIST 800-171 controls.

Early reports on JSVA assessments highlight the importance of proper FIPS 140-2 implementation, as many organizations are struggling to meet the FIPS standard for the protection of CUI on devices and endpoints. Earlier data shared by DIBCAC confirms the problem: lack of compliance with NIST 800-171 control 3.13.11, FIPS-validated cryptography, tops the list of DIBCAC’s Top 10 “other than satisfied” (aka, not met) NIST 800-171 controls.

To learn how a PreVeil customer achieved a 110/110 NIST 800-171 score in a Joint Surveillance Voluntary Assessment, see this case study.

Clearly, FIPS 140-2 standards are hard to meet. But if you rely on a CSP or other outside vendor to encrypt your CUI, it’s easy to find out if they comply with FIPS 140-2, as explained below.

How to tell if it’s real FIPS 140-2

The easiest way to determine if your CSP is FIPS 140-2 certified is to check the NIST Cryptographic Module Validation Program (CMVP) website. Click here to search for a company’s name in NIST’s Validated Modules database. If the vendor you are considering working with is listed there, that means they have been tested and validated by the NIST CMVP program—and you can implement their encryption technology with confidence.

Achieving the NIST CMVP standard is no easy feat. Vendors can take up to 18 months to complete the necessary three-step program. Each step must be done in order and cannot be begun until the previous one is completed.

To pass, vendors must:

  1. Document all cryptographic methods and algorithms implemented against the FIPS 140-2 standard. Any gaps in the vendor’s implementation must be closed either by creating necessary code or documentation.
  2. Participate in the NIST Cryptographic Algorithm Validation Program (CAVP) where an independent NIST-approved lab tests and evaluates the algorithms implemented in the vendor’s code. Each algorithm that passes will receive a CAVP certificate from NIST.
  3. Have NIST test and evaluate the cryptographic module from end-to-end including the documentation and the CAVP-certified algorithms that are used in the module itself. When the testing is complete and approved, only then will NIST issue a CMVP certificate for the validated cryptographic module.

Only after this third step and being listed in the NIST Validated Modules database can a vendor truthfully claim that they are using FIPS 140-2 validated cryptographic modules.

What about “FIPS Inside”?

Some vendors will claim that they comply with FIPS 140-2 standards without undergoing the NIST CMVP certification process. They will point to what is commonly called “FIPS Inside,” which means they implement FIPS-approved crypto libraries or use FIPS-approved algorithms in their solutions, but their implementation has never been vetted by NIST itself.

While it’s possible to meet the NIST standard for FIPS 140-2 but not undergo the validation process, it’s extremely difficult for a defense contractor to determine the validity of the vendor’s claim. A contractor would have to examine the vendor’s code and ensure all algorithms and modules meet the FIPS 140-2 requirements, and validate methods that are frequently invisible to contractors such as self-tests, service access controls, error handling, entropy tests, as well as many other features beyond the encryption algorithms themselves. This testing is complicated, time consuming and costly.

Be wary of vendors who self-attest to meeting the FIPS 140-2 standard. Only a CMVP certificate ensures that you have best-in-class security when it comes to the encryption standards your vendor provides. Here’s PreVeil’s CMVP certificate. Any trustworthy vendor will be willing to show you theirs, too.

Conclusion

As a defense contractor, the ultimate responsibility for ensuring compliance lies with you. It is your responsibility to ensure that any software or hardware you use to encrypt CUI meets the critical security parameters set forth by FIPS 140-2. A reputable CSP will be able to provide you with its FIPS 140-2 certificate.

Today, many CSPs are promising contractors that they can help them meet the mandates of FIPS 140-2, NIST 800-171, CMMC, and more. The challenge is to ensure that the CSP you are considering working with actually meets DoD mandates for protecting CUI. Ask the CSP for the appropriate certification and/or documentation proving that they comply with what they say they do, and if they’ve helped contractors go through DoD assessments. Otherwise, your organization runs the risk of wasting time and money, and introducing compliance deficiencies and complexities.

To learn more

PreVeil is trusted by more than 1,000 small and mid-size defense contractors to meet its compliance needs faster and more affordably.

  • If you have questions about how PreVeil can help your defense organization achieve compliance, contact us
  • Sign up here for a free 15-minute consultation with our compliance team

Author

Orlee Berlove, reviewed by Gregg Laroche

Gregg LaRoche has spent over 20 years in the technology field, building and improving products sold in regulated markets. He is currently VP of Product Management at PreVeil. He has deep expertise in bringing products to market in regulated industries such as healthcare, human resources and cybersecurity. He puts this skill set to good use at PreVeil ensuring our technologies meet strict compliance requirements while maintaining best-in-class security.

Orlee Berlove has been a marketing leader for over 25 years, and is currently the Senior Director of Marketing at PreVeil. She has her Masters of Engineering, Operations Research and her Bachelor of Arts from Cornell University.

Related Blog

See All Blog
September 9, 2024PreVeil Enables CMMC Level 2 Compliance with M365 CommercialCMMCSeptember 6, 2024Who is responsible for protecting CUI?CMMC
What is FIPS 140-2 and Why it's Important (2024)

FAQs

What is FIPS 140-2 and Why it's Important? ›

FIPS (Federal Information Processing Standard) 140-2 is the benchmark for validating the effectiveness of cryptographic hardware. If a product has a FIPS 140-2 certificate you know that it has been tested and formally validated by the U.S. and Canadian Governments.

What is the purpose of FIPS? ›

FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.

What is USA FIPS 140-2? ›

The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products, as defined in Section 5131 of the Information Technology Management Reform Act of 1996.

Is FIPS 140-2 obsolete? ›

The U.S. federal government's transition to the FIPS 140-3 cryptography standard has begun, with NIST announcing that all FIPS 140-2 certificates will be retired in September 2026.

What is the FIPS 140-2 certification standard? ›

FIPS 140-2 Overview

Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. This standard specifies the security requirements that will be satisfied by a cryptographic module.

What are the benefits of FIPS 140-2? ›

Protection of sensitive data. FIPS 140-2 certification is also critical for organizations that handle sensitive data, such as financial institutions, healthcare organizations, and technology companies. It ensures that their customers' information is protected from cyber attacks and breaches.

Who needs to comply with FIPS? ›

All federal departments and agencies must use FIPS 180 to protect sensitive unclassified information and federal applications. Secure hash algorithms can be used with other cryptographic algorithms, like keyed-hash message authentication codes or random number generators.

What are the 4 levels of FIPS 140-2? ›

FIPS 140-2 is a standard which handles cryptographic modules and the ones that organizations use to encrypt data-at-rest and data-in-motion. FIPS 140-2 has 4 levels of security, with level 1 being the least secure, and level 4 being the most secure: FIPS 140-2 Level 1- Level 1 has the simplest requirements.

How to determine FIPS 140-2 compliance? ›

The easiest way to determine if your CSP is FIPS 140-2 certified is to check the NIST Cryptographic Module Validation Program (CMVP) website. Click here to search for a company's name in NIST's Validated Modules database.

What is the alternative to FIPS 140-2? ›

Alternative cryptography standards to FIPS 140-2 that can be used as a substitute include AES (Advanced Encryption Standard), Camellia, and Serpent. However, each of these other options comes with its own set of pros and cons, so it is important to select the one that best serves the purpose.

Is FIPS 140-2 Hipaa compliant? ›

Platforms that collect, store and transmit protected health information (PHI) must comply with the Health Insurance Portability and Accountability Act (HIPAA). FIPS 140-2 compliance enables such institutions to adhere to the regulations and protect sensitive health-related data.

Is FIPS 140-2 NIST? ›

The Cryptographic Module Validation Program (CMVP - www.nist.gov/cmvp) validates cryptographic modules to FIPS 140-2 and other cryptography based standards. The CMVP is a joint effort between NIST and the Canadian Centre for Cyber Security (CCCS - https://cyber.gc.ca/en/).

Is FIPS the same as NIST? ›

Definitions: A standard for adoption and use by federal departments and agencies that has been developed within the Information Technology Laboratory and published by NIST, a part of the U.S. Department of Commerce.

What is FIPS 140-2 classified? ›

The FIPS 140-2 standard is an information technology security approval program for cryptographic modules produced by private sector vendors who seek to have their products certified for use in government departments and regulated industries (such as financial and health-care institutions) that collect, store, transfer, ...

How does FIPS work? ›

FIPS compliance means an application or product is leveraging Federal Information Processing Standard -approved encryption modules to protect the data that is at rest on or in transit through it. It's a very specific type of compliance in that it applies only to certain encryption modules and how they're used.

What is the difference between FIPS 140-2 and 140-3? ›

FIPS 140-2 required modules to support a crypto officer role and a user role, with an optional maintenance role. In FIPS 140-3, the crypto officer role is the only required role. For levels 1-3, FIPS 140-2 and 140-3 are fairly similar. However, FIPS 140-3 requires multi-factor authentication at Level 4.

What is a FIPS code used for? ›

FIPS state codes
NameAlpha codeNumeric code
CaliforniaCA06
Canal Zone *07
ColoradoCO08
ConnecticutCT09
70 more rows

What happens when FIPS is enabled? ›

Encryption modules for information technology and computer security programs that are running in FIPS mode will perform Federal Information Processing Standards-compliant functions such as key generation, encryption, and decryption.

What happens if I disable FIPS? ›

If FIPS is enabled, Windows can only use FIPS-validated encryption and advises all applications to do so as well. Other encryption schemes are blocked, even if they are newer, faster, and more secure. Because of this, disabling the FIPS mode will not cause any security issues.

What is the purpose of FIPS 200? ›

FIPS 200 addresses the specification of minimum security requirements for federal information and information systems. FIPS 199 addresses the classification divides systems. It divides the systems into high, moderate, and low impact systems based on their impact on individuals and organizations.

Top Articles
Family Link from Google - Family Safety & Parental Control Tools
Full Guide: How Do I Set Up a VPN at Home?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Maia Crooks Jr

Last Updated:

Views: 6249

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Maia Crooks Jr

Birthday: 1997-09-21

Address: 93119 Joseph Street, Peggyfurt, NC 11582

Phone: +2983088926881

Job: Principal Design Liaison

Hobby: Web surfing, Skiing, role-playing games, Sketching, Polo, Sewing, Genealogy

Introduction: My name is Maia Crooks Jr, I am a homely, joyous, shiny, successful, hilarious, thoughtful, joyous person who loves writing and wants to share my knowledge and understanding with you.