With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels.
In this blog, you'll learn more about FIPS 140-3, why it's important, and how it differs from FIPS 140-2 to enhance protection of data-at-rest, data-in-transit, and data-in-use.
Released in 2019, FIPS 140-3 (Federal Information Processing Standard 140-3) is the latest U.S. and Canadian co-sponsored security standard for hardware, firmware, and software solutions.
This standard is a benchmark for validating the effectiveness, security, and dependability of cryptographic hardware. So a FIPS 140-3-certified product has been formally tested and validated by both the U.S. and Canadian governments.
FIPS 140-3's predecessor, FIPS 140-2, has been adopted worldwide by government and non-government sectors as a standard cybersecurity best practice.
When FIPS 140-3 was released, a sunset period was announced for all FIPS 140-2 certificates. As of April 2022, FIPS 140-3 supersedes FIPS 140-2.
Any entity that processes Sensitive But Unclassified (SBU) information relating to the federal government needs to comply with FIPS 140-3.
This ranges from third-party vendors, contractors, cloud technology providers, and any organization that provides solutions to be integrated within the federal government's SBU ecosystem.
Organizations that do not comply with FIPS 140-3 are at risk of being fined by NIST (National Institute of Standards and Technology).
Compliance with FIPS 140-3 has the added benefit of verification from a third party that all processes are operating as expected, avoiding interoperability and integration issues.
The main differentiation between FIPS 140-2 and FIPS 140-3 is that FIPS 140-3 incorporates two existing standards with slight modifications.
Let's take a look at each:
This standard specifies the requirements for selecting, using, and managing cryptographic modules to improve the protection of sensitive resources; it also specifies four levels of security for each of the 11 requirements, where the degree of security increases as each level progresses.
This will become the derived testing requirement (DTR) for all testing labs. The methods outlined here specify objective test requirements to enforce a unified testing process across all testing laboratories.
The requirements of both ISO/IEC 19790:2012 and ISO 24759:2017 are harmonized so that conformance to the testing standards outlined in ISO 24759:2017 demonstrate compliance with ISO/IEC 19790:2012.
FIPS 140-3 is now more closely aligned with ISO/IEC standard, so vendors and organizations will have an easier time upgrading to the new standards.
Other differences are outlined in the next section.
FIPS 140-2 only addresses security requirements after completion, but FIPS 140-3 now evaluates security requirements at all stages of cryptographic module creation--from design, implementation, and final operational deployment.
FIPS 140-3 has 11 derived test requirements (DTRs) detailing the requirements that need to be met in order to demonstrate conformance to the standard. Each requirement also describes the methods that the testing lab will take to test the module.
All requirements have been updated from the FIPS 140-2 versions:
Let's take a look at each:
Within each of the 11 DTRs, there are four increasing qualitative security levels. At each level, greater amounts of evidence and engineering are needed to show a product's compliance with FIPS 140-3.
Let's take a look at the requirements of each level:
At Trenton Systems, our USA-made, high-performance computing solutions protect critical data at-rest, in-transit, and in-use across the hardware, firmware, software, and network stack with advanced, multi-layer cybersecurity technologies.
Our 5G-powered, edge compute systems can support both FIPS 140-2 and FIPS 140-3 self-encrypting drives (SEDs) to keep large amounts of sensitive information safe from unauthorized access and maintain operational integrity.
In both rack mount and small form factor, we customize our systems per our customers' most complex security requirements, incorporating next-gen SEDs from a variety of different manufacturers such as Micron and UDInfo.
Zero-trust architected with Intel® hardware-based security technologies like PFR, SGX, and TME, our solutions ensure that applications across the commercial, military, and industrial sectors are guarded against the most sophisticated of cyberattacks.
With a heightened risk of cyberattacks and an increasingly interconnected technological ecosystem, protecting data-at-rest, data-in-transit, and data-in-use is of the utmost importance now more than ever.
Requiring organizations to meet FIPS 140-2 and FIPS 140-3 certification is a crucial step in ensuring the security, integrity, and functionality of applications across the government, military, and critical infrastructure landscape.
In partnership with Intel®, Trenton Systems stands at the forefront of developing critical, cybersecure mission computers to provide our warfighters with a strategic, tactical, and operational advantage.
Want to learn more about how you can construct a secure computing system with the latest encryption technologies? Just reach out us anytime here.
We'd be happy to help. 🙂 🇺🇸
Sources: