Do all cryptographic modules in use in your solution conform to the Federal Information Processing Standards (FIPS PUB 140-2 or 140-3)?
Explanation
Example Responses
Example Response 1
Yes, all cryptographic modules used in our solution are FIPS 140-2 or 140-3 compliant Our application uses the following validated modules: 1) Microsoft Windows 10 Cryptographic Primitives Library (Certificate #3197) for disk encryption and secure communications, 2) OpenSSL FIPS Object Module 2.0 (Certificate #1747) for our web services encryption needs, and 3) Thales Luna Network HSM 7 (Certificate #3205) for key management We maintain documentation of all cryptographic modules in use and verify FIPS compliance annually as part of our security review process.
Example Response 2
Yes, our solution uses FIPS 140-2/140-3 validated cryptographic modules throughout our infrastructure For our cloud-hosted components, we leverage AWS's FIPS-validated endpoints and services (AWS KMS is validated under FIPS 140-2, Certificate #2839) Our application code exclusively uses the BouncyCastle FIPS Java library (Certificate #3514) for all cryptographic operations Our mobile applications use the Apple iOS CoreCrypto Kernel Module (Certificate #3856) and Android Keystore with FIPS-validated implementations We maintain an inventory of all cryptographic modules and their respective FIPS validation status in our security documentation.
Example Response 3
No, not all cryptographic modules in our solution currently conform to FIPS 140-2 or 140-3 While our primary encryption for data at rest uses Microsoft BitLocker (FIPS 140-2 validated, Certificate #3084), our web application currently uses a non-FIPS validated implementation of TLS through Node.js's built-in crypto library We are aware of this gap and have scheduled a remediation project to replace this with a FIPS-validated alternative (likely Node.js FIPS module) within the next quarter In the meantime, we have implemented additional security controls including network segmentation, enhanced monitoring, and regular penetration testing to mitigate potential risks associated with the non-FIPS validated cryptography.
Context
- Tab
- Product
- Category
- Data

