User Tools

Site Tools


products:ict:security:fips_140

FIPS 140, or the Federal Information Processing Standard Publication 140, is a U.S. government standard that defines security requirements for cryptographic modules. These modules are used in a wide range of information technology products and systems to protect sensitive information through encryption and other cryptographic techniques. FIPS 140 is particularly important in the government and regulated industries, such as finance and healthcare. Here's a detailed explanation of FIPS 140:

1. Background and Purpose:

FIPS 140 is published by the National Institute of Standards and Technology (NIST), a U.S. government agency responsible for developing and promoting standards and guidelines for various industries, including information security. The primary purpose of FIPS 140 is to ensure that cryptographic modules used in federal information systems provide a high level of security.

2. Scope:

FIPS 140 applies to cryptographic modules, which are hardware or software components that perform cryptographic functions, such as encryption, decryption, digital signatures, and key management. These modules are used in various devices and systems, including network appliances, mobile devices, secure communication systems, and more.

3. Levels of Certification:

FIPS 140 defines four security levels (Levels 1 to 4), each with increasingly stringent security requirements. Organizations and vendors can choose the appropriate level of certification based on their specific security needs and the potential risks associated with the use of cryptographic modules.

 a. **Level 1**: Basic security requirements, focusing on the use of approved algorithms and key management. No physical security mechanisms are required at this level.
 b. **Level 2**: Adds requirements for tamper-evident coatings or seals and role-based authentication.
 c. **Level 3**: Enhances physical security with the addition of tamper-detection mechanisms that zeroize critical security parameters when tampering is detected.
 d. **Level 4**: The highest level of security, with the most stringent physical security requirements, including active protection mechanisms that can respond to tampering attempts.

4. Cryptographic Requirements:

FIPS 140 specifies various cryptographic requirements, including:

  1. The use of approved cryptographic algorithms and key lengths.
  2. Protection of cryptographic keys and other sensitive data.
  3. Secure key generation, storage, distribution, and destruction.
  4. Cryptographic module self-tests to detect and respond to tampering and other security breaches.
  5. Key management practices, including secure key generation and distribution.

5. Certification Process:

Cryptographic modules are typically submitted for certification to accredited testing laboratories that evaluate the modules against the relevant FIPS 140 security level. If the module meets the requirements, it is awarded a FIPS 140 certification. The certification process involves extensive testing, including security assessments and vulnerability assessments.

6. Government and Industry Adoption:

While FIPS 140 is a U.S. government standard, its influence extends beyond government agencies. Many regulated industries, including finance and healthcare, require the use of FIPS 140-certified cryptographic modules to protect sensitive data. Additionally, FIPS 140 certification is often a prerequisite for selling products and services to the U.S. government.

7. Ongoing Compliance:

Organizations and vendors must ensure ongoing compliance with FIPS 140 requirements. This includes regular audits and assessments to verify that cryptographic modules maintain their security posture over time.

In summary, FIPS 140 is a critical standard that defines security requirements for cryptographic modules used to protect sensitive information. It plays a pivotal role in ensuring the security of information systems, particularly in government and regulated industries, and helps organizations and vendors make informed decisions about the security of their cryptographic solutions.

products/ict/security/fips_140.txt · Last modified: 2023/09/21 10:41 by wikiadmin