Cryptographic Module definition
Examples of Cryptographic Module in a sentence
Verify that the encryption solutions in use have been validated under the Cryptographic Module Validation Program to confirm compliance with FIPS 140-2.
FIPS 140-2 validation can be determined online through the Cryptographic Module Validation Program Search, with information about the Cryptographic Module Validation Program under FIPS 140-2.
In all other cases, only algorithms and key lengths approved by the National Institute of Standards and Technology (NIST) in the Cryptographic Module Validation Program (CMVP) or Cryptographic Algorithm Validation Program (CAVP) may be used.
The Contractor shall use Federal Information processing Standard (FIPS) 140-2- compliant encryption (Security) Requirements for Cryptographic Module, as amended) to protect all instances of HHS sensitive information during storage and transmission.
The Contractor shall verify that the selected encryption product has been validated under the Cryptographic Module Validation Program (see ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/groups/STM/cmvp// ) to confirm compliance with FIPS 140-2 (as amended).
The Contractor shall verify that the selected encryption product has been validated under the Cryptographic Module Validation Program (see ▇▇▇▇://▇▇▇▇.▇▇▇▇.▇▇▇/groups/STM/cmvp/) to confirm compliance with FIPS 140-2 (as amended).
The Contractor shall use Federal Information processing Standard (FIPS) 140-2-compliant encryption (Security) Requirements for Cryptographic Module, as amended) to protect all instances of HHS sensitive information during storage and transmission.
Verify that the encryption solutions in use have been validated under the Cryptographic Module Validation Program to confirm compliance with current FIPS 140 validation certificate from the NIST CMVP.
Ensure COPA and PSERS classified and confidential data are encrypted during rest and transit in alignment with industry standards, including but not limited to, NIST Cryptographic Module Validation Program.
Ensure non-Windows environments requiring full disk encryption, utilize full disk encryption that conforms to AES specifications and the NIST Cryptographic Module Validation Program.