Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Understanding FIPS Validated vs. FIPS Compliant
April 13, 2023 •Evgeny Gervis
Our last blog post looked at why FIPS 140 is so important. We also examined why obtaining a FIPS 140 certificate is so difficult and why maintaining that FIPS 140 certificate in active status is even more difficult. In this post, we will look at how being FIPS validated, which means your organization has a FIPS certificate in your name, fundamentally differs from being FIPS compliant (called by some 'FIPS Inside'), which means you use a FIPS certified encryption module that another organization obtained in its name. Ultimately, you will see that FIPS validation is preferable to FIPS compliance.
Naturally, many organizations will not find the traditional approach to achieving and maintaining FIPS 140 validation of their cryptographic modules particularly appealing. These organizations will then search for alternate paths that are more efficient, more predictable, and less costly. As organizations look for these alternative paths, it helps to remember the adage that “there is no free lunch.” Someone must follow the traditional approach to achieve and maintain FIPS 140 validation, incurring the associated costs and headaches. Otherwise, the solution is invalid.
Organizations looking to outsource the entire FIPS 140 validation lifecycle to someone else may consider a few choices. One popular path is to leverage a “free” open-source module that has achieved FIPS 140 validation. Another is to leverage an operating system or a cloud service provider with FIPS 140 validated libraries that it can use for encryption. By leveraging FIPS 140 validated modules from these sources, organizations can immediately become FIPS 140 compliant. Unfortunately, while taking the above approach may look like a silver bullet to solving the FIPS 140 problem, many organizations learn the hard way that it is not. There are at least two reasons for this.
Organizations Should Have CMVP Certificates in Their Names
First, FIPS 140 compliance itself may not be good enough. When an organization is FIPS compliant, it uses someone else’s FIPS 140 validated module. Their FIPS certificate is not in the organization’s name, but in the name of the original entity that created the module and shepherded it through the lab and CMVP. So, naturally, that certificate will not list the organization’s products, operating environments, or anything else specific to that organization.
That is problematic because many government agencies and procurement officers will want to see that the CMVP certificate has the organization’s specific details. Without that being the case, it may be challenging to demonstrate that the organization is actually using the FIPS 140 validated module in its solution and using it as intended.
Some compliance regiments like Common Criteria will also require specific testing of the FIPS 140 validated module within the organization’s operating environment (OE), evidence of which needs to appear on the organization’s CMVP certificate.
In short, organizations risk getting blocked out of deals by not having certificates in their names. That is also more likely to happen when competitors with their own CMVP certificates use them to give themselves an advantage in the procurement process. Consequently, for any organization serious about its public sector business, getting its own CMVP certificate is a smart move they should view as table stakes.
Reliance on Third Parties for FIPS 140 Compliance is Risky
Even if organizations are willing to risk it without their own CMVP certificates, there is another fundamental problem with relying on third parties for FIPS 140 compliance. Unless operating system vendors, cloud service providers, and open-source providers are contractually obligated to the organization to maintain their FIPS 140 validated modules and certificates in active status with CMVP, these cryptographic modules may not survive a NIST transition and become historical. As a result, any organization relying on those modules will no longer be FIPS 140 compliant when that happens.
That may happen because a module’s OEM:
- decides that a particular module is no longer worth the effort to maintain
- decides to take their solutions in a different direction (e.g., end-of-life of a specific OS version)
- simply misses the boat, encounters issues, or gets delayed in making the needed updates to the module to keep it in good standing with NIST
If any of these happen, an organization may find itself in a tough position, especially if it happens at precisely the wrong time when it is trying to negotiate (or even just stay on) a major contract with a government agency.
The above risks are not theoretical and happen all the time. In fact, as of April 2023, fully 79% of the FIPS certificates in the CMVP database have been declared ‘historical’ by NIST. As a result, they can no longer be used as the basis for new government procurements, either by the organization named on the certificate or any organization claiming FIPS compliance based on that certificate. So why take the chance and gamble being left out of a lucrative contract because of FIPS?
In our business, we constantly talk to companies that have learned the hard way that there is no free lunch regarding FIPS 140 validation. It is hard, non-stop work, and the best path is to find a trusted, experienced partner to whom you can outsource the whole process of achieving and maintaining FIPS 140 validation. Doing so will not be free, but if you consider all the costs and risks, it will represent the best value and the highest ROI.
Some organizations try to address this problem via a “rebranding” process where they work with a lab to duplicate an existing third-party CMVP certificate in its name. But, does that solve the problem? Only temporarily, mainly because, as we have mentioned previously, attaining certification is only part of the problem. Maintaining it over time is far more challenging. In our next blog post, we will examine why FIPS rebranding is insufficient.
Evgeny Gervis
Evgeny is the CEO of SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)