FIPS 140-2 is a federal information processing standard that manages security requirements for cryptographic modules. The National Institute of Standards and Technology (NIST) published the security standard in November 2001 to develop coordinated requirements for hardware computer components.
NIST replaced FIPS 140-2 with FIPS 140-3 in March 2019. This iteration introduced new critical security parameters for software and firmware and updated the four critical security levels that FIPS 140-2 introduced. These four levels of security include regulations that the U.S. government and other highly regulated industries that store, collect, or disclose sensitive information (finance, healthcare, etc.) must comply with.
.jpeg)
Cryptography is an encryption method that utilizes technical codes to protect sensitive data and ensure information security. This method commonly uses cryptographic keys, algorithms, and crypto techniques such as microdots or encryption (scrambling plaintext into ciphertext).
Sensitive data includes any information, whether original or copied from another source, that contains:
Some regulatory standards, including the EU’s General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act of 1996 (HIPPA), and the Gramm-Leach-Bliley Act (GLBA), all include provisions that protect other types of information as sensitive data.
Recommended reading: What is the Primary Method for Protecting Sensitive Data? and What is Sensitive Data?
NIST released the FIPS 140 publication series in 1994 to establish the cryptographic module validation program (CMVP) through a joint effort with the Canadian government.
Starting with FIPS 140-1, the publication series now spans three iterations, each improving upon the last and fortifying the validation process with increasingly robust standards.
As previously mentioned, FIPS 140-1 established the CMVP. The publication is one of NIST’s most successful standards and is still relevant today. Unlike other published standards that have changed in scope or applicability, FIPS 140-1 has only been strengthened by FIPS 140-2 and FIPS 140-3.
When the NIST introduced FIPS 140-1, it imposed requirements across eleven areas of cryptographic modules:
.png)
FIPS 140-2 ensures that the hardware organizations utilize to store sensitive data and other protected information meets critical security specifications and key management requirements.
This second iteration of the FIPS publication series introduced the FIPS certification process, which is defined by four increasing, qualitative levels of security.
Overall, FIPS 140-3 expanded the scope of FIPS 140-2 to cover firmware and software in addition to hardware computer components. The FIPS 140-3 standard supersedes all FIPS 140-2 standards from its effective date in 2019. FIPS 140-3 also incorporates two existing standards (ISO 19790 and ISO 24759) to elevate its requirements for cryptographic modules and cryptographic algorithms.
With FIPS 140-3, NIST also updated several requirements within its qualitative security levels. Most notably, these updates included:
The UpGuard blog, “What is FIPS 140-3? The Critical Updates You Must Be Aware Of,” includes additional information about FIPS 140-3. The blog also lists additional technical differences between FIPS 140-2 and FIPS 140-3.
The Federal Information Security Management Act (FISMA) requires various U.S. entities to maintain FIPS-compliant cryptographic modules. Canada has also adopted FIPS standards to validate cryptographic modules throughout several highly regulated industries.
Overall, the following groups are required to comply with FIPS 140 standards:
Additional industries, such as finance, healthcare, and other highly regulated practices, have also adopted FIPS standards because of the publication’s advanced focus on securing and protecting sensitive data.
The U.S. Federal Government is currently establishing practices to validate all FIPS 140-2 certificates with the new standards outlined by FIPS 140-3. In addition, NIST announced that all FIPS 140-2 validations will be retired by September 2026.
UpGuard Vendor Risk empowers organizations to achieve compliance across their digital supply chains. Users of UpGuard Vendor Risk can access UpGuard’s flexible vendor questionnaire library or configure custom questionnaires of their own using the platform’s intuitive and easy-to-use interface.
After sending and receiving vendor questionnaires, organizations can also utilize UpGuard’s remediation workflows to work alongside vendors to solve compliance issues and eliminate compliance risks.
Overall, UpGuard Vendor Risk enables organizations to elevate their third-party risk management programs through the use of powerful cybersecurity tools such as:
Start your UpGuard free trial right now. Or, discover how UpGuard helps organizations protect their internal and external attack surfaces by learning more about UpGuard’s robust cybersecurity solutions.