FIPS 140-2 Certification
Meet your needs for data security compliance with FIPS140-2 certified products
The Federal Information Processing Standard (FIPS) Publication 140-2 (FIPS PUB 140-2), commonly referred as FIPS 140-2, is a US government computer security standard used to validate cryptographic modules. FIPS 140-2 was created by the NIST and, per the FISMA, is mandatory for US and Canadian government procurements. Many global organizations are also mandated to meet this standard. FIPS 140-2 compliance has been widely adopted around the world in both governmental and non-governmental sectors as a practical security benchmark and realistic best practice.
Entrust delivers security products that have been tested and validated against the rigorous FIPS 140-2 encryption compliance standard. Entrust FIPS 140-2 compliant products help you comply with regulations while also giving you the confidence you need in your cryptographic tools.
Descripción
Security Standard
According to FIPS Publication 140-2:
“[FIPS PUB 140-2] provides a standard that will be used by Federal organizations when these organizations specify that cryptographic-based security systems are to be used to provide protection for sensitive or valuable data. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. This standard specifies the security requirements that will be satisfied by a cryptographic module.
The security requirements cover areas related to the secure design and implementation of a cryptographic module. These areas include cryptographic module specification; cryptographic module ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.”
Certification Authorities
The US NIST (National Institute of Standards and Technology) and Canadian CSE (Communications Security Establishment) jointly participate as certification authorities in the CMVP (Cryptographic Module Validation Program) to provide validation of cryptographic modules to the FIPS 140-2 standard.
For more information, read our What is FIPS 140-2? FAQ page.
Compliance Overview
Entrust nShield HSM Support for FIPS 140-2 Security Standard
The Entrust nShield® family of hardware security modules (HSMs) conform to the FIPS 140-2 security standard. Entrust nShield HSMs, available in FIPS 140-2 Level 1, 2 and 3 models, provide secure solutions for generating encryption and signing keys, creating digital signatures, encrypting data and more in a variety of environments.
Product Compliance Detail
Please find a summary of nShield FIPS 140-2 and other certifications
Recursos
Brochures: Entrust nShield HSM Family Brochure
Entrust nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, Entrust nShield HSMs support a variety of deployment scenarios.
Datasheet: Entrust nShield Connect
Entrust nShield Connect HSMs are certified, networked appliances that deliver cryptographic key services to applications distributed across servers and virtual machines.
Datasheet: Entrust nShield Solo
Entrust nShield Solo HSMs are certified PCI-e card-based solutions that deliver cryptographic key services to applications hosted on individual servers and appliances.
Datasheet: Entrust nShield Edge HSMs
Entrust nShield Edge HSMs are USB-connected desktop devices that provide convenience and economy for environments requiring low-volume cryptographic key services.
Soluciones relacionadas
Productos relacionados

nShield Connect
Dispositivos en red que brindan servicios de claves criptográficas a aplicaciones distribuidas en servidores y máquinas virtuales.

nShield Solo
Las tarjetas PCI-Express se basan en HSM y ofrecen servicios de claves criptográficas para aplicaciones alojadas en servidores y dispositivos individuales.

nShield Edge
Módulos de seguridad de hardware de escritorio conectados por USB que proporcionan comodidad y economía para entornos que requieren servicios de claves criptográficas de bajo volumen.

nShield Hardware Security Modules
Hardened, tamper-resistant environments for secure cryptographic processing and key management.