FIPS CONSULTING SERVICES | FIPS 140-2

National Institute of Standards and Technology (NIST)

CyberSecOp FIPS Consulting services will provide consulting services to provide the documentation and test plans needed to obtain a Common Criteria Certificate.   We will also provide FIPS 140-2 Validation consulting services to US-based companies on an as-requested basis.

CyberSecOp FIPS Consulting services ensure that sensitive data, such as Personally Identifiable Information (PII), secure in every stage of its life is an important task for any organization. To simplify this process, standards, regulations, and best practices were created to better protect data. The Federal Information Protection Standard, or FIPS, is one of these standards. These standards were created by the National Institute of Science and Technology (NIST) to protect government data and ensure those working with the government comply with certain safety standards before they have access to data.

FIPS compliance consulting Services

Our FIPS Compliance Experts have been performing FIPS Compliance Consulting Services for more than a decade. Our FIPS compliance consulting services help public sector agencies interpret FIPS requirements and implement programs that effectively maintain continuous compliance.

FIPS 140-2 Validation and Consulting

Organizational Readiness and Product Gap Analysis – Initial product FIPS 140-2 readiness assessment is conducted in workshop fashion with your product engineers and management.

FIPS 140-2 Evidence Consolidation – Turnkey consulting service to help you consolidate all FIPS 140 specific documentation needed for a successful FIPS 140 validation (Testing and Evaluation).

FIPS 140-2 Validation (Testing and Evaluation) – Testing and evaluation of your cryptographic module against the FIPS 140-2 Publication.

Cryptographic Algorithm Testing – Conduct algorithm testing that will be submitted to the Cryptographic Algorithm Validation Program (CAVP) and upon approval published to a public listing. CAVP is sometimes a prerequisite for FIPS 140-2 Validations and Common Criteria PP Evaluations.

Product Validation Maintenance (Revalidation) – Once FIPS 140 validated, a vendor can avoid having to repeat the cumbersome full validation process by updating their current certificate to include newer product versions (software, firmware, hardware). The changes CyberSecOp can process as a Revalidation include but are not limited to: bug fixes, new product features, operating system/ processor porting, etc.

FIPS 140-2 and ISO/IEC 19790 Differences Analysis Consulting – Be on the forefront of the FIPS 140 evolution with this in depth overview of the key differences in the proposed international iteration of FIPS 140.

 Ad-Hoc Consulting Services – We can provide the needed resources to help augment your staff when an organization’s technical resources may not be available.

Embedded “FIPS Inside” Module Compliance Review – Oftentimes, a product embeds a FIPS 140 Validated Cryptographic Module within i.e. “FIPS Inside”, but fails to utilize the Module in a correct and secure fashion. CyberSecOp can review the Module integration within your product and advise on any flaws and non-compliances.

FIPS Consulting services

  • FIPS 140 covers cryptographic module and testing requirements in both hardware and software.

  • FIPS 180 specifies how organizations can be FIPS compliant when using secure hash algorithms for computing a condensed message.

  • FIPS 186 is a group of algorithms for generating a digital signature.

  • FIPS 197 is a standard that created the Advanced Encryption Standard, which is a publicly accessible cipher approved by the National Security Agency (NSA) for top secret information.

  • FIPS 198 is about a mechanism for message authentication that utilizes cryptographic hash functions.

  • FIPS 199 standardizes how federal agencies categorize and secure information and information systems the agency collects or maintains.

  • FIPS 200 is a standard that helps federal agencies with risk management through levels of information security based on risk levels.

  • FIPS 201 specifies the standard for common identification for federal employees and contractors.

  • FIPS 202 gives the specifications for the Secure Hash Algorithm-3 (SHA-3) family of four

Our FIPS consultant will prepare and revise all of the documentation and algorithm testing required for validation and communicate with the lab throughout the entire FIPS 140-2 process. This frees up your staff to focus on product development. And, because consultants are familiar with FIPS, they are able to quickly address common problems that may arise during the FIPS 140-2 process, preventing costly and time-consuming delays. That means you’ll be able realize the ROI on your validation and your product even faster.