FIPS 140-3 Security Requirements for Cryptographic Modules
Federal standard for cryptographic module validation derived from ISO/IEC 19790:2012. Defines four increasing security levels covering cryptographic module specification, interfaces, roles and authentication, software/firmware security, operational environment, physical security, non-invasive attack resistance, sensitive security parameter management, self-tests, and life-cycle assurance. Validated through the NIST Cryptographic Module Validation Program (CMVP) with NVLAP-accredited testing laboratories.
AC Access Control
CA Security Assessment and Authorization
| Control | Name | FIPS 140-3 References |
|---|---|---|
| CA-08 | Penetration Testing | FIPS 140-3 §7.10 |
CM Configuration Management
| Control | Name | FIPS 140-3 References |
|---|---|---|
| CM-02 | Baseline Configuration | FIPS 140-3 §7.6 |
| CM-03 | Configuration Change Control | FIPS 140-3 §7.11 |
| CM-05 | Access Restrictions For Change | FIPS 140-3 §7.11 |
| CM-06 | Configuration Settings | FIPS 140-3 §7.2FIPS 140-3 §7.6 |
| CM-07 | Least Functionality | FIPS 140-3 §7.6 |
| CM-14 | Signed Components | FIPS 140-3 §7.5 |
IA Identification and Authentication
MP Media Protection
| Control | Name | FIPS 140-3 References |
|---|---|---|
| MP-06 | Media Sanitization And Disposal | FIPS 140-3 §7.9 |
PE Physical and Environmental Protection
| Control | Name | FIPS 140-3 References |
|---|---|---|
| PE-03 | Physical Access Control | FIPS 140-3 §7.7 |
| PE-04 | Access Control For Transmission Medium | FIPS 140-3 §7.7 |
| PE-05 | Access Control For Display Medium | FIPS 140-3 §7.7 |
| PE-06 | Monitoring Physical Access | FIPS 140-3 §7.7 |
| PE-19 | Information Leakage | FIPS 140-3 §7.7FIPS 140-3 §7.8 |
| PE-20 | Asset Monitoring and Tracking | FIPS 140-3 §7.7 |
RA Risk Assessment
SA System and Services Acquisition
| Control | Name | FIPS 140-3 References |
|---|---|---|
| SA-03 | Life Cycle Support | FIPS 140-3 §7.11 |
| SA-04 | Acquisitions | FIPS 140-3 §7.11FIPS 140-3 §7.2 |
| SA-08 | Security Engineering Principles | FIPS 140-3 §7.2 |
| SA-10 | Developer Configuration Management | FIPS 140-3 §7.11FIPS 140-3 §7.5 |
| SA-11 | Developer Security Testing | FIPS 140-3 §7.11FIPS 140-3 §7.12FIPS 140-3 §7.5 |
| SA-15 | Development Process, Standards, and Tools | FIPS 140-3 §7.11 |
| SA-17 | Developer Security and Privacy Architecture and Design | FIPS 140-3 §7.2 |
SC System and Communications Protection
| Control | Name | FIPS 140-3 References |
|---|---|---|
| SC-03 | Security Function Isolation | FIPS 140-3 §7.3 |
| SC-07 | Boundary Protection | FIPS 140-3 §7.3 |
| SC-12 | Cryptographic Key Establishment And Management | FIPS 140-3 §7.9 |
| SC-13 | Use Of Cryptography | FIPS 140-3 §7.2FIPS 140-3 §7.3FIPS 140-3 §7.9 |
| SC-17 | Public Key Infrastructure Certificates | FIPS 140-3 §7.9 |
| SC-28 | Protection of Information at Rest | FIPS 140-3 §7.8FIPS 140-3 §7.9 |
| SC-34 | Non-modifiable Executable Programs | FIPS 140-3 §7.5 |
| SC-39 | Process Isolation | FIPS 140-3 §7.6 |