Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Warning: Plan Your Validation Carefully
May 2, 2014 •Walt Paley
I'm always interested in the comments of engineers who recently completed a FIPS 140-2 evaluation. It's like the entire team had a meeting and played 'Not It', sealing the poor bastard's fate for the last year-and-a-half or so. Seems fair, right?
It really isn't their fault. Maybe they contributed to a NIST evaluation early in their career, and they made the mistake of putting it on their resumé. Maybe they were cocky and volunteered, figuring that it couldn't be 'that hard' or 'that time consuming'. Or maybe they simply had the misfortune of being late that day. Regardless, they became responsible for a process that doesn't always make logical sense to an engineer and seemingly small early decisions have major ramifications for the entire lifespan of the product in question.
In some cases, veteran engineers with a pedigree in cryptography still get aggravated and befuddled by the inner workings at the CMVP. The inspiration for this blog entry came from our friends at Oracle. Darren Moffat, a Senior Principal Software Engineer based in the UK, vented about his experience in a post titled 'Is FIPS 140-2 actively harmful to software?'.
Before we go any further, the answer is no. FIPS 140-2 is definitely not harmful.
Darren's frustration centers around the establishment of validation boundaries.
Why does the FIPS 140-2 boundary matter? Well unlike in Common Criteria with flaw remediation in the FIPS 140-2 validation world you can't make any changes to the compiled binaries that make up the boundary without potentially invalidating the existing valiation. Which means having to go through some or all of the process again and importantly this cost real money and a significant amount of elapsed time.
He's absolutely on point. The boundary is a crucial strategy point for every validation, and as a vendor pursuing a FIPS certificate, you want to set it carefully. There's no sense validating and locking in features that will require future updates. From a user standpoint, this is exactly as it should be. By insuring that any changes within the boundary require re-testing, buyers can be confident that a product's encryption module has been fully vetted in its current form.
Moffat goes on, asserting that engineers ought to be able to issue patches and bug fixes without invalidating the FIPS certificate. I agree completely! This is precisely why SafeLogic's CryptoComply family of validated cryptographic modules maintains a tight boundary. The core crypto libraries are tested and validated, then left intact while the rest of the vendor's product can be updated as needed. Users know that the encryption within is of the highest quality, and there are no negative side effects of active updates from the provider. This is a win-win, and it all stems from establishing the correct boundary for the CMVP.
I don't agree with Moffat that most customers don't care about FIPS 140-2, and I don't agree that customers that care are only checking the box and don't worry whether the certificate is still valid. Oracle's commitment to updating and patching their software is fantastic, but it should not come at that cost. They invested a great deal in getting that certificate, and it should not be pushed aside so easily. Earning a FIPS 140-2 validation requires time, money and commitment. (Significantly less of all three if you use SafeLogic's RapidCert, but still enough to be relevant.) If done correctly, there should not be a choice between validated crypto and properly updated software. This is a toxic ultimatum for both the provider and the user, and it should be avoided.
To share your thoughts and stories from the trenches, tweet at us @SafeLogic!
Walt Paley
Walter Paley is the VP of Communications for SafeLogic. He is responsible for strategy, content, marketing, and outreach. Walt has worked with a series of start-ups and companies in growth stages, including Nukona (acquired by Symantec), Qubole, Bitzer Mobile (acquired by Oracle), and TigerText, among others. An Alumnus of the psychology program at UC San Diego, Walt lives in Southern California with his wife, kids, and their black lab, Echo.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)