![]() Microsoft in-scope cloud platforms & services Multiple Microsoft products, including many cloud services, use these cryptographic modules.įor technical information on Microsoft Windows cryptographic modules, the security policy for each module, and the catalog of CMVP certificate details, see the Windows and Windows Server FIPS 140-2 content. ![]() Microsoft validates its cryptographic modules under the National Institute of Standards and Technology (NIST) Cryptographic Module Validation Program (CMVP). Microsoft maintains an active commitment to meeting the 140-2 requirements, having validated cryptographic modules since the standard's inception in 2001. Microsoft's approach to FIPS 140-2 validation The NIST Information Technology Laboratory operates a related program that validates the FIPS approved cryptographic algorithms in the module. The FIPS 140-2 security requirements cover 11 areas related to the design and implementation of a cryptographic module. National Institute of Standards and Technology (NIST) and the Canadian Centre for Cyber Security (CCCS), validates cryptographic modules to the Security Requirements for Cryptographic Modules standard (i.e., FIPS 140-2) and related FIPS cryptography standards. The Cryptographic Module Validation Program (CMVP), a joint effort of the U.S. ![]() government standard that defines minimum security requirements for cryptographic modules in information technology products, as defined in Section 5131 of the Information Technology Management Reform Act of 1996. The Federal Information Processing Standard (FIPS) Publication 140-2 is a U.S. In this article FIPS 140-2 standard overview
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |