Proper Use of FIPS 140-3 Logo
Now that you have a FIPS 140-3 certificate, watch this video to obtain and properly use the FIPS 140-3 logo in your sales and marketing materials. KeyPair Consulting – FIPS 140 …
Now that you have a FIPS 140-3 certificate, watch this video to obtain and properly use the FIPS 140-3 logo in your sales and marketing materials. KeyPair Consulting – FIPS 140 …
If your FIPS 140-2 module includes any FIPS 186-2 algorithms (other than signature verification), then you may be one of the 100+ modules bumped to the CMVP’s historical list (aka …
Q: I need to apply a fix to my FIPS 140-2 module to address a CVE. What process do I follow to maintain my FIPS 140-2 certificate? The Implementation Guidance for …
Sure, you are wise to include a previously validated FIPS 140-2 cryptographic module in your product, but are you adding value for your customers or causing procurement delays? In our …
Let’s assume that you have met the porting requirements for listing additional operating environments in your FIPS 140-2 Security Policy. (As a reminder, those requirements are detailed in the FIPS 140-2 …
I often receive questions about maintaining a FIPS 140-2 certificate after changes are made to the module. Here is some information from the trenches for those not familiar with the …