What is FIPS 140-2 Certification? (2024)

What is FIPS 140-2 Certification?

The Federal Information Processing Standard (FIPS) Publication 140-2 (FIPS PUB 140-2), commonly referred as FIPS 140-2, is a US government computer security standard used to validate cryptographic modules. FIPS 140-2 was created by theNISTand, per theFISMA, is mandatory for US and Canadian government procurements. Many global organizations are also mandated to meet this standard.

FIPS 140-2 Overview

According toFIPS Publication 140-2:

[It] provides a standard that will be used by Federal organizations when these organizations specify that cryptographic-based security systems are to be used to provide protection for sensitive or valuable data. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. This standard specifies the security requirements that will be satisfied by a cryptographic module.

… The security requirements cover areas related to the secure design and implementation of a cryptographic module. These areas include cryptographic module specification; cryptographic module ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.

Certification Authorities

The US NIST (National Institute of Standards and Technology) and Canadian CSE (Communications Security Establishment) jointly participate as certification authorities in the CMVP (Cryptographic Module Validation Program) to provide validation of cryptographic modules to the FIPS 140-2 standard.

Related Articles

What is FIPS 140-2 Certification? (2024)

FAQs

What is FIPS 140-2 Certification? ›

FIPS (Federal Information Processing Standard) 140-2

FIPS (Federal Information Processing Standard) 140-2
The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on May 25, 2001, and was last updated December 3, 2002.
https://en.wikipedia.org › wiki › FIPS_140-2
is the benchmark for validating the effectiveness of cryptographic hardware. If a product has a FIPS 140-2 certificate you know that it has been tested and formally validated by the U.S. and Canadian Governments.

How to become FIPS 140-2 compliant? ›

To achieve FIPS 140-2 validation or certification, all components of a security solution, including both hardware and software, must undergo testing and approval by one of the NIST-accredited independent laboratories.

What is the FIPS 140-2 Federal Information Processing Standard? ›

FIPS 140-2 standard overview

The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products, as defined in Section 5131 of the Information Technology Management Reform Act of 1996.

How do I verify FIPS 140-2 compliance? ›

How to tell if it's real FIPS 140-2. The easiest way to determine if your CSP is FIPS 140-2 certified is to check the NIST Cryptographic Module Validation Program (CMVP) website. Click here to search for a company's name in NIST's Validated Modules database.

How long does it take to get FIPS certified? ›

A NIST approved lab will test the system to ensure its certification. This process generally takes around 6 – 9 months.

What is the meaning of FIPS 140-2 certified? ›

FIPS (Federal Information Processing Standard) 140-2 is the benchmark for validating the effectiveness of cryptographic hardware. If a product has a FIPS 140-2 certificate you know that it has been tested and formally validated by the U.S. and Canadian Governments.

What is the difference between FIPS-compliant and certified? ›

A security system that's FIPS certified is likely to provide greater data security than one that's FIPS compliant. Companies that advertise FIPS-certified systems typically provide safer products, as only systems that pass rigorous testing receive validation from NIST-approved labs and receive a FIPS certification.

What are the requirements for FIPS? ›

FIPS compliance means a product meets all the necessary security requirements established by the U.S. government for protecting sensitive information. To be FIPS-compliant, a product must adhere to rigid standards, pass rigorous testing, and be certified by NIST.

What is the alternative to FIPS 140-2? ›

Alternative cryptography standards to FIPS 140-2 that can be used as a substitute include AES (Advanced Encryption Standard), Camellia, and Serpent. However, each of these other options comes with its own set of pros and cons, so it is important to select the one that best serves the purpose.

Is FIPS 140-2 outdated? ›

The U.S. federal government's transition to the FIPS 140-3 cryptography standard has begun, with NIST announcing that all FIPS 140-2 certificates will be retired in September 2026.

What does FIPS mean? ›

FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. Learn More.

How to enable FIPS 140-2? ›

To enable or disable FIPS 140-2:
  1. Access the printer's Embedded Web Server and log in as a System Administrator. From your computer or network-connected device (on the same network as the printer) open a Web browser. ...
  2. Click System > Security.
  3. In the Network Security area, click FIPS 140-2.
  4. Select On or Off, then click OK.
Oct 6, 2020

Does Hipaa require FIPS 140-2? ›

Data at rest

Encrypting data in motion is straightforward: Valid encryption processes must “comply with the requirements of Federal Information Processing Standards (FIPS) 140–2.” While there are many technical requirements involved, finding a vendor that offer products that are FIPS 140-2 compliant, is the solution.

What is the difference between FIPS 140-2 and 140 3? ›

FIPS 140-2 required modules to support a crypto officer role and a user role, with an optional maintenance role. In FIPS 140-3, the crypto officer role is the only required role. For levels 1-3, FIPS 140-2 and 140-3 are fairly similar. However, FIPS 140-3 requires multi-factor authentication at Level 4.

WHO issues FIPS codes? ›

FIPS are standards for federal computer systems that are developed by the National Institute of Standards and Technology (NIST) and approved by the Secretary of Commerce in accordance with the Information Technology Management Reform Act of 1996 and Computer Security Act of 1987.

Why do I need FIPS? ›

Enhances data protection: FIPS sets high standards, which are necessary to protect data. Federal government agencies store, use and share large amounts of sensitive information across different devices and systems, and it's only reasonable to put the best possible security measures in place.

How do I enable FIPS 140-2? ›

To enable or disable FIPS 140-2:
  1. Access the printer's Embedded Web Server and log in as a System Administrator. From your computer or network-connected device (on the same network as the printer) open a Web browser. ...
  2. Click System > Security.
  3. In the Network Security area, click FIPS 140-2.
  4. Select On or Off, then click OK.
Oct 6, 2020

Is FIPS 140-2 obsolete? ›

The U.S. federal government's transition to the FIPS 140-3 cryptography standard has begun, with NIST announcing that all FIPS 140-2 certificates will be retired in September 2026.

What is FIPS 140-2 compliant key management? ›

Key management

The standard specifies key generation, storage, and transmission requirements to ensure that cryptographic keys are protected from unauthorized access or tampering. This includes requirements for secure key storage, secure key transmission, and the use of secure key escrow processes.

What is FIPS 140-2 compliant file transfer? ›

FIPS 140-2 certification ensures that cryptographic modules meet the highest levels of security and confidentiality so organizations better mitigate the risk of unauthorized access to confidential information like CUI, CDI, and FCI.

Top Articles
iOS vs Android: Surprising User Engagement Numbers!
Aflac Supplemental Insurance
Afc Urgent Care East Hanover Reviews
Qhc Learning
Quillins Weekly Ad
Peoplesgas Login
Dr Manish Patel Mooresville Nc
Deborah Clearbranch
Amazing Lash Bay Colony
Towson Transcript
Kwik Kar Guymon Ok
Craigslist En Español En Miami
Citibank Branch Locations In Orlando Florida
Puff Hall Road
Northeast Ob Gyn Associates Quarry
Cinemark University Mall Showtimes
Jobs Hiring Start Tomorrow
Best And Cheap Nail Polish
Wired Hvcc
Tmc Vidown
Ww2 Solarmovie
La Salsas Morganton Nc
Inchiriaza Ford Mustang GT | THECAR - Inchirieri auto Bucuresti
Myjohnshopkins Mychart
Hartland Liquidation Oconomowoc
Feeling lucky? Top prizes still available for these Ohio Lottery scratch-off games
South Coast Plaza: A Can’t Miss California Shopping Destination
Ruth 1 Esv
Www. Lowe's.com
How do i get all ark skins on PS4?
Dora Saves Fairytale Land/Transcript
Appliance Liquidation 6920 Cypress Creek
Denverpost.com Login
Premium Kanalliste – KronosIPTV
Renfield Showtimes Near Cinemark North Haven And Xd
Amazon Ups Drop Off Locations Near Me
Craigslist Meadville Farm And Garden
9Xmovie Worldfree4U
LUVSQUAD Discord Server
Wi Dept Of Regulation & Licensing
Hapi Burkett
Craigslist Horse For Sale By Owner
Breindy Active Fitness
Shaughnessy Funeral Fairfield Ct
What is "Brrr skibidi dop dop / dom dom yes yes"? Memes, explanation, meaning, definition - Bedeutung Online
8.7 Increase Of 841
Atliens Hip Hop Duo Crossword
Williams Funeral Home Warrensburg Mo
7Th Gear Exotics Tampa
Psjaisd Calendar
Jennifer Maker Website
Latest Posts
Article information

Author: Gov. Deandrea McKenzie

Last Updated:

Views: 6293

Rating: 4.6 / 5 (46 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Gov. Deandrea McKenzie

Birthday: 2001-01-17

Address: Suite 769 2454 Marsha Coves, Debbieton, MS 95002

Phone: +813077629322

Job: Real-Estate Executive

Hobby: Archery, Metal detecting, Kitesurfing, Genealogy, Kitesurfing, Calligraphy, Roller skating

Introduction: My name is Gov. Deandrea McKenzie, I am a spotless, clean, glamorous, sparkling, adventurous, nice, brainy person who loves writing and wants to share my knowledge and understanding with you.