Protecting Data with Controller-Based Encryption, Part 3

Author: Kevin BurbankFIPS

What you need to know before submitting a cryptographic module for FIPS validation.

My first post gave an overview of the FIPS validation process.  The second post explored the FIPS 140-2 validation levels and their requirements.

This final post will cover some other things to keep in mind when submitting a cryptographic module for FIPS validation.

Continue reading

facebooklinkedinmail


Protecting Data with Controller-Based Encryption, Part 2

Author: Kevin BurbankFIPS

In the first post of this encryption series, I explained what Controller-based Encryption (CBE) is and gave an overview of the FIPS validation process.  Now, I want to explore the Federal Information Processing Standards 140 (FIPS 140-2) validation levels and their requirements.

Continue reading

facebooklinkedinmail


Protecting Data with Controller-Based Encryption, Part 1

Author: Kevin BurbankFIPS

We all know that data protection is critical, and with the growing adoption Controller Based-Encryption (CBE) for 8G Fibre Channel and 12G SAS/SATA controllers, I’ve heard from a lot of people who want to know more about the FIPS certification process for products that use CBE modules.

Over the course of this series, I’ll explain CBE and why it’s necessary, also, outline some of the key details you need to know in order to get FIPS certification for cryptographic modules.

Continue reading

facebooklinkedinmail