What is FIPS 140-2?#
Federal Information Processing Standard (FIPS) 140-2 is a U.S.
government computer security standard used to accredit
cryptographic modules. The standard specifies four levels of security, each providing a
higher degree of protection. FIPS 140-2 ensures that cryptographic tools used by U.S.
federal agencies and by contractors and vendors working with these agencies meet stringent
requirements for securing sensitive government data.
Originally issued in 2001 by the National Institute of Standards and Technology
(NIST), FIPS 140-2 is critical for the protection against the
compromise of several forms of data including sensitive but unclassified, personally
identifiable information (PII), and protected health information (PHI).
- FIPS 140-2 is a U.S. government standard that ensures cryptographic modules meet
stringent security requirements.
- Establishes four security levels, from basic security (Level 1) to very high security
(Level 4).
- Mandatory for federal agencies and affects vendors and contractors working with the U.S.
government.
Detailed Overview and Impact#
FIPS 140-2 addresses the requirements for cryptographic modules in terms of both hardware
and software components. It's essential for securing various digital transactions and
protecting communications across federal information systems.
Levels of Security#
- Level 1: Provides basic security. Ensures that the cryptographic module meets
specified requirements for the security of algorithms and their correct implementation.
- Level 2: Introduces features like role-based access control (RBAC) and physical
tamper-evidence to prevent unauthorized access.
- Level 3: Enhances security with features like identity-based authentication and
physical tamper-resistance. Requires physical or logical separation to ensure that
critical security parameters are not compromised.
- Level 4: Offers the highest form of security with robust resistance against physical
environmental attacks and intrusion.
Compliance and Validation#
Achieving FIPS 140-2 certification involves rigorous testing to validate that
cryptographic modules meet the exhaustive criteria set forth in the standard. This process
is crucial for manufacturers of cryptographic modules who intend to sell their products
for use in governmental communications.
- Trust and Assurance: Helps in building trust in cryptographic practices implemented
within security systems, ensuring that sensitive data handled by the government is
protected against adversaries.
- Market Access: Compliance with FIPS 140-2 is often a prerequisite to participating
in government contracts involving sensitive data, making it essential for vendors
targeting this market.
- International Recognition: Though a U.S. standard, FIPS 140-2 is recognized
globally, influencing international markets and practices in cryptographic security.
FIPS 140-2 FAQs#
What does FIPS 140-2 certification involve?#
FIPS 140-2 certification involves a series of tests performed by accredited laboratories
to ensure cryptographic modules meet strict security standards.
Who needs to comply with FIPS 140-2?#
Any organization that manufactures, sells, or uses cryptographic modules within U.S.
federal systems must comply with FIPS 140-2.
How does FIPS 140-2 benefit organizations?#
Compliance with FIPS 140-2 enhances security, builds customer trust, and enables
participation in government and related contracts requiring high-level security of
cryptographic modules.

See how Corbado fits your passkey rollout and existing authentication stack.
Explore the Console