FIPS 140-2, "Security Requirements for Cryptographic Modules," establishes the U.S. and Canadian government standard for cryptographic module security. Validated under the Cryptographic Module Validation Program (CMVP), jointly operated by NIST and the Canadian Centre for Cyber Security (CCCS).
Validation Levels: FIPS 140-2 defines four increasing levels of security:
| Level | Description | VSI Deployment |
|---|---|---|
| Level 1 | Basic security requirements. Approved algorithms and functions. | Minimum for all VSI deployments |
| Level 2 | Adds tamper-evidence (seals, coatings) and role-based authentication. | Standard for government deployments |
| Level 3 | Adds tamper-resistance and identity-based authentication. | Available for classified deployments |
| Level 4 | Complete physical security envelope. Highest level. | Coordinated per program requirement |
VSI deployments utilize FIPS 140-2 validated cryptographic modules from NIST-approved vendors. The following table lists the primary cryptographic modules used across VSI platforms:
| Module Name | Vendor | CMVP Cert # | Level | Use Case |
|---|---|---|---|---|
| AWS-LC Cryptographic Module | Amazon Web Services | 4564 | 1 | GovCloud encryption services |
| Microsoft Azure FIPS Module | Microsoft | 4536 | 1 | Azure Government deployments |
| OpenSSL FIPS Object Module | OpenSSL Software Foundation | 3678 | 1 | Application-layer cryptography |
| BoringCrypto Module | 4735 | 1 | Container-level cryptography | |
| SafeNet Luna HSM | Thales Group | 4423 | 3 | Key management for classified deployments |
All validation certificates are publicly verifiable at: csrc.nist.gov/projects/cryptographic-module-validation-program
VSI implements FIPS 140-2 across all layers of the system stack:
VSI AI systems exclusively use NIST-approved cryptographic algorithms as listed in FIPS 140-2 Annex A. The following algorithms are implemented:
| Algorithm | Standard | Key Size / Parameters | Use |
|---|---|---|---|
| AES | FIPS 197 | 128, 192, 256-bit | Symmetric encryption |
| SHA-2 Family | FIPS 180-4 | 256, 384, 512-bit | Hashing, digital signatures |
| RSA | FIPS 186-4 | 2048, 3072, 4096-bit | Asymmetric encryption, signatures |
| ECDSA | FIPS 186-4 | P-256, P-384, P-521 | Digital signatures |
| ECDH | SP 800-56A | P-256, P-384 | Key agreement |
| DRBG (Hash) | SP 800-90A | SHA-256, SHA-384 | Random number generation |
| HMAC | FIPS 198-1 | SHA-256, SHA-384, SHA-512 | Message authentication |
| PBKDF2 | SP 800-132 | SHA-256 / SHA-512 | Password-based key derivation |
To ensure FIPS 140-2 compliance is maintained in client environments, the following configuration requirements apply to all government deployments:
The following table maps FIPS 140-2 implementation to key federal requirements:
| Requirement | Source | VSI Implementation |
|---|---|---|
| Use of FIPS-validated cryptography | FISMA, OMB A-130 | All modules listed in Section 02 |
| Approved cryptographic algorithms | NIST SP 800-53 SC-13 | See Section 04 algorithm table |
| Cryptographic key management | NIST SP 800-57 | HSM-based, automated rotation |
| Encryption for data in transit | NIST SP 800-52 Rev 2 | TLS 1.3 with FIPS cipher suites |
| Encryption for data at rest | NIST SP 800-111 | AES-256-GCM, FIPS 140-2 validated |
| IL4 cryptographic requirements | DoD Cloud SRG | FIPS 140-2 Level 1+ modules |
| IL5 cryptographic requirements | DoD Cloud SRG | FIPS 140-2 Level 1+ in GovCloud |
| NSS cryptographic requirements | CNSSP-15 | Coordinated per program |