Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Why FIPS Rebranding is Not Enough
April 13, 2023 •Evgeny Gervis
In our last blog post, we looked at why FIPS compliance is fundamentally different from and not nearly as desirable as achieving FIPS validation. Some organizations try to address this problem via a “rebranding” process where they work with a lab to duplicate an existing third-party CMVP certificate in their name. Doing so requires getting permission from the certified module’s OEM. Some open-source projects now offer to do so for their clients, usually for a yearly fee. After a rebrand, the organization will have a certificate in its name listed on the CMVP website. Does that solve the problem? Only temporarily, because, as we have mentioned previously, attaining certification is only part of the problem. Maintaining it over time is far more challenging.
Here at SafeLogic, we know a lot about rebranding. SafeLogic revolutionized the FIPS 140 validation industry over a decade ago. We started offering an accelerated FIPS 140 validation journey that allowed organizations to get their own CMVP certificates in under eight weeks instead of 18-24 months. At the heart of that innovation is rebranding, a technique that essentially creates a new certificate by inheriting from a base CMVP certificate that corresponds to a previously validated FIPS 140 module. We call that RapidCert. Since then, other companies have begun to leverage the same technique to get somebody else a certificate in their name quickly.
With all our experience with rebrands, we can say unequivocally that rebranding is not enough. Not even close. Yes, it gets an organization its own certificate quickly, but that is it. It is a snapshot in time. The initial certificate that CMVP grants may indicate that it is good for about five years. However, that unfortunately will not be the case. Unless the certification and the associated module are properly maintained, it will become historical very quickly and will no longer be valid.
How often do certificates go historical? The answer is very often. In fact a quick review of the CMVP databases shows that 3,559 of the 4,500 certificates listed are currently Historical! That means only 20% of all FIPS certificates can be used to support new procurements.
That is why SafeLogic has a managed service called MaintainCert that maintains software and certifications for our clients in a white-glove fashion.
Let us examine more specifically why rebranding is not enough.
FIPS 140 Requirements Are Constantly Changing
FIPS 140 requirements are constantly changing because of Moore’s Law and because the cryptoanalytic techniques of adversaries are not standing still. When NIST changes FIPS 140 requirements, CMVP will have what it calls a “transition.” That means that cryptographic module developers must update their modules and associated documentation, get the labs to perform additional testing, and then get CMVP to review the changes. Without going through this process, the previously validated FIPS 140 module and the associated certificate will go historical and can no longer be used.
These transitions may involve factors such as changes in allowed algorithms, changes to key sizes, changes to wrapping/padding schemes, etc. Transitions tend to happen about every 6-12 months, sometimes cutting the useful lives of certificates quite significantly below their theoretical five-year sunsets. In fact, a transition occurred in 2022, and roughly 50% of previously active FIPS 140 validated modules did not survive it. The bottom line is that someone must keep doing significant work to maintain the certificate and the underlying module to keep up with the latest FIPS 140 standards.
New Security Vulnerabilities Get Discovered
Outside of FIPS 140 requirements changing, new security vulnerabilities are continuously being discovered. If fixes to these security vulnerabilities fall within the cryptographic boundary of a validated module, the fixed module will need to go through lab and CMVP validation processes again. The certificates may then need to be updated as well. This is also where a cryptographic module’s original design and implementation matter. A poorly designed module may be very difficult to maintain and require constant revalidation efforts.
Additional Operational or Algorithm Testing Needed
Sometimes, the FIPS 140 validated module must be tested in an organization’s specific operating environment (OE). In those cases, an organization will need someone to help with that testing, work with the lab, and then work with CMVP to update its certificates with its own tested OEs. For instance, Common Criteria requires such a testing regimen.
Operational testing may also be required if an organization wants to add an OE to the certificate not part of the initially tested configuration. Algorithm testing may also be necessary when an organization wants to add an additional cryptographic algorithm to its certification. In those cases, much extra work will need to be done as part of the rebranding effort or afterward.
Certificate Maintenance
Many potential administrative changes may also require working with the lab and CMVP to update the certificate after the initial rebrand. These may include organizational name changes, product name changes, product version updates, operating system updates, etc. All of these mean additional work must be done to keep everything up to date.
The above examples hopefully demonstrate that attaining a CMVP certificate, even if done in an accelerated manner via a rebrand, is not a one-and-done deal. FIPS 140 validated modules and their certificates must be maintained to ensure everything remains up to date, active, and in good standing for when the organization needs them to win a key public sector deal.
Evgeny Gervis
Evgeny is the CEO of SafeLogic.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)