Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
NIST Announces Availability of FIPS 140-3 Interim Validation Option
May 23, 2024 •Evgeny Gervis
NIST publicly announced this week a brand-new interim validation option whereby cryptographic modules that have been submitted to NIST’s cryptographic module validation program (CMVP) will be able to secure fast-tracked interim FIPS 140-3 validation. With a large backlog of FIPS 140-3 validations in the NIST CMVP queue, NIST is making some important structural changes to the validation process, such as rolling out automation that will make it far more efficient to identify non-conformances and thus move the review process along more quickly. Interim validation is introduced as a way to reduce the size of the current queue and to ensure that a sufficient number of modules can achieve FIPS 140-3 validation status before modules validated under FIPS 140-2 sunset and go historical.
To qualify for this interim validation, cryptographic modules submitted to NIST CMVP will need to meet very specific requirements. The following bulleted lists come verbatim from NIST’s CMVP website (https://csrc.nist.gov/projects/cryptographic-module-validation-program):
- Submitting Cryptographic Security Testing (CST) lab must be in an active status with NVLAP.
- Received by the CMVP prior to 1 Jan 2024, and have not yet been validated.
- Fully tested and evaluated for conformance to the FIPS 140-3 standard by an active, accredited CST lab.
- Recommended for validation by the accredited CST lab who performed the testing.
- In addition to the original submission documents, the CST lab must also complete and sign a CMVP-provided requirement checklist.
- The vendor must inform the CMVP through their CST lab if they elect to choose interim validation. Electing for interim validation is available until 1 Oct 2024.
NIST CMVP will review modules for completeness and there will be a short period of coordination between NIST CMVP and the CST Lab to resolve any questions. Once the interim validation is completed:
- A two-year sunset date (expiration date) will be awarded.
- The ‘Interim Validation” caveat will be added to the certificate validation entry to distinguish them from a full validation
- An optional follow-up submission that conforms to the SP 800-140Br1 format may be submitted to the CMVP. Upon successful review and completion of this submission, the “Interim Validation” caveat will be removed, and the sunset date modified to add three more years to reflect a change from two to five years for the total sunset length.
- Any non-compliance identified (e.g., during the follow-up review) will be resolved with existing processes and provide the opportunity for a timely resolution prior to moving the validation certificate to the Historical or Revocation lists
- This follow-up submission must be received by the CMVP prior to the two-year sunset date to remain on the active list until the completion of the follow-up submission.
- The validation will be moved to the historical list if the follow-up submission is not received prior to the two-year sunset date.
The pursuit of the interim validation option is voluntary, and cryptographic module vendors can choose to wait for full validation without taking any action.
NIST is taking this important action after consultation with its Cryptographic and Security Testing (CST) laboratories and the cryptographic module vendor community. It was necessary to make some changes in the FIPS 140-3 validation process to meet the demand that the world has for FIPS 140-3 validated cryptographic modules, and so NIST is doing just that.
Given these new developments, it is natural that many organizations will have questions. If you find yourself having questions, please do not hesitate to reach out to us. SafeLogic is well prepared and positioned to help its customers with an orderly transition from FIPS 140-2 to FIPS 140-3 modules in a white-glove fashion. We can help your organization obtain your very own FIPS 140 certification in approximately eight weeks, then keep that certification active through all the transitions, including the FIPS 140-2 to FIPS 140-3 transition. This way, your organization can rest assured that the SafeLogic cryptography you use in your own products will meet the requirements of government agencies for both continued operation and for new procurements, giving your company a distinct competitive advantage.
Evgeny Gervis
Evgeny is the CEO of SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)