Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
The UC APL Obstacle Course
August 8, 2013 •Wes Higaki
Here at SafeLogic, many of our customers are focused on opportunities to sell to the US Federal Government. The large and long-term contracts provide an incentive to jump through hoops and meet additional procurement requirements, which are a costly maze of complicated, expensive, and time-consuming barriers to entry. But once you have qualified, you are in great position to capture those deals, not to mention opportunities in the private sector. In some cases, there are multiple layers of requirements that must be met. One of the most stringent is the placement of a product on the UC APL.
The UC APL, the United States Department of Defense Unified Capabilities Approved Product List, is administered by DISA, the Defense Information Systems Agency. It was created to centralize the available solutions for the Department of Defense (DoD) and to provide a standardized method for approval. Before the UC APL, different agencies and branches had to create redundant approval processes. The establishment of the UC APL was a major positive step for both the DoD and the product vendors, streamlining the process and creating a single resource for qualified solutions.
The advantage of being listed on the UC APL does not begin and end with the DoD. Federal agencies in other branches prioritize solutions that appear on the UC APL, as they know and respect the vetting process exercised by DISA and the DoD. In fact, just as FIPS 140-2 has become an internationally recognized standard, products on the UC APL carry the same relative weight.
In order to qualify for the UC APL, products must be tested rigorously by JITC, the Joint Interoperability Test Command. This testing has two elements – Information Assurance (IA) and Interoperability (IO). While IO testing has strict requirements in its own right, IA is typically the more challenging of the two. IA testing adheres to the 2,000+ page Unified Capabilities Requirements document, and the product must meet a series of Security Technical Implementation Guides (STIGs) which outline best practices. On top of that, Information Assurance demands that if the product includes encryption (and it nearly always does), that a FIPS 140-2 validation exists. Common Criteria sometimes comes into play as well. Don’t worry, we can help there, too.
UC APL testing is truly a marathon, not a sprint, and it has many obstacles. Ok, maybe it’s more like a mud run. It can definitely get messy. There is good news, though. We have identified one way to accelerate the process. As it turns out, the JITC parameters allow for products to initiate testing upon their addition to the NIST (National Institute of Standards and Technology) CMVP (Cryptographic Module Validation Program) In Process list for FIPS 140-2. In layman’s terms, this means that products that still need to earn their FIPS 140-2 certificate can go through both the JITC and the NIST CMVP validations simultaneously. This is huge. It’s like getting your bachelor’s degree while you’re still in high school. Completing both certificates in parallel saves significant time and means that you can begin realizing revenue months faster.
CryptoComply and RapidCert, exclusively from SafeLogic, take full advantage of this opportunity. Even for the folks who are aware of this rule, initiating a FIPS 140-2 validation is difficult. The inertia is high during the first phase, documentation, which can take a great deal of time if you’re not leveraging RapidCert. [For more detailed discussion of the accelerated timelines offered by CryptoComply and RapidCert, refer to my blog posts 'Leapfrogging the Competition' and 'If Time Equals Money...'.] When a JITC certificate is part of the strategy, the opportunity is even bigger.
We will be posting a case study in the near future that illustrates this very strategy. By implementing CryptoComply and adding the RapidCert option, a customer was able to take a product that had no FIPS 140-2 validation and within a month be in progress with their JITC certificate. In the past, they would have been looking at approximately a year to get to the same stage.
So don’t hesitate to talk to SafeLogic. There’s a lot at stake here, so let’s strategize and make things happen.
Wes Higaki
Wes Higaki was a co-Founder of SafeLogic. Wes has over 30 years of technical and managerial experience in the software industry and received a BS in mathematics from UC Davis and a Master’s in CS from the University of Santa Clara. He is now retired and focused on writing fiction.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)