FIPS Compliance

The Federal Information Processing Standards (FIPS) are standards published by the National Institute of Standards and Technology (NIST) and are used by federal agencies as well as organizations that handle federal information. These standards are particularly focused on cryptographic modules designed to protect sensitive but unclassified data. The use of FIPS establishes common criteria to evaluate technology through independent testing and recognized validation procedures.

Compliance with FIPS means a cryptographic module has passed independent assessment against specific FIPS publications — most notably those in the FIPS 140 series. Validation confirms that encryption, key management, authentication, and related security functions are implemented correctly and at required assurance levels. Although FIPS covers several topics, FIPS 140 validation is the most frequently referenced mark of compliance for information security products. 

Why FIPS Compliance Is Essential

Validated cryptographic modules offer assurance over the confidentiality, integrity, and availability of information in environments facing elevated risk. Deploying solutions that have successfully undergone FIPS testing minimizes the chance of security flaws being introduced, supporting strong encryption, robust key management, and reliable protection for data at rest and in transit.

Policy and Procurement Relevance

For U.S. federal agencies and contractors, FIPS compliance is not only a policy requirement — it also serves as a gate in procurement processes. Deploying FIPS-validated modules is expected when handling sensitive but unclassified data, shaping both procurement and overall system authorization decisions.

Failure to comply with these requirements may result in contract risk, delayed or denied system authorizations, and technical vulnerabilities that could compromise security objectives. Outside the federal government, FIPS validation is adopted by many organizations as a best practice for risk management and to meet customer assurance and regulatory demands.

Relationship with FedRAMP and Broader Frameworks

FIPS compliance is tightly linked to other U.S. government frameworks. For example, cloud service authorizations through FedRAMP require FIPS-validated encryption in alignment with NIST SP 800-53 control baselines. Similarly, compliance frameworks in law enforcement, healthcare, public safety, and state requirements frequently reference or align with FIPS and its associated cryptographic standards.

Who Needs FIPS-Validated Cryptography

The use of FIPS-validated cryptographic modules is required for organizations that store, process, or transmit federal information. This includes:

  • Federal agencies and their direct contractors

  • Subcontractors and suppliers in federal supply chains

  • Technology companies with federal customers

  • Cloud service providers seeking government authorization

In addition to the federal government, sectors with stringent security expectations, including defense, public safety, utilities, healthcare, and finance — often require FIPS compliance to meet risk management or contractual demands.

Steps to Achieve and Sustain FIPS Compliance

Achieving FIPS validation involves a methodical process, combining technical evaluation with strict operational oversight. A typical roadmap starts with comprehensive assessment and leads through to ongoing monitoring and lifecycle management.

Core Actions for Compliance

  • Inventory all cryptographic modules in use, documenting version numbers and existing validation status.

  • Assess requirements using FIPS 140-3, ensuring the reference architecture includes approved algorithms, secure key lifecycle management, and documented dependencies.

  • Replace or upgrade non-validated modules as necessary, confirming configurations are restricted to approved modes.

  • Update internal policies to require procurement and use of validated cryptography for sensitive information.

  • Provide training to technical staff on proper use of approved algorithms, secure implementation, and operational best practices.

  • Establish monitoring systems for module versions, status of validation certificates, and relevant NIST or CMVP bulletins.

The Validation Process

  • FIPS validation is administered through CMVP, a collaboration between NIST and the Canadian Centre for Cyber Security (CCCS). Vendors submit modules for laboratory testing, with certificates issued by NIST/CCCS after successful evaluation. It is incumbent on deploying organizations to ensure the validated configuration matches what is used in production.
  • Validation involves meeting appropriate requirements for the relevant security level and module type, including software, firmware, or hardware. This generally includes meeting roles and service controls, self-testing routines, strong protections for keys, and operational usage guidance. Ongoing efforts are needed to maintain compliance, which may include monitoring vendor advisories, tracking expiration of certificates, and planning technology refreshes.

Practical Tips for Maintaining Compliance

  • Configure systems to use only approved algorithms and modes, preventing deviation over time.

  • Consolidate cryptographic services where feasible to reduce complexity and exposure.

  • Keep detailed records of validation documents and deployment evidence.

  • Integrate FIPS compliance checks within software development and deployment pipelines.

  • Test system changes in controlled environments to ensure continued compliance after upgrades or patches.

Role of Technology Partners and Platforms

Technology vendors and platform providers can play a pivotal role in streamlining FIPS compliance for their customers, typically by:

  • Incorporating FIPS-validated modules into their solutions for data protection

  • Supplying clear documentation and validation certificates for audit support

  • Enabling controls to enforce use of approved cryptography and validated configurations

  • Providing visibility into module status for effective oversight

  • Offering best practice guidance for deployment and operational management

The selection of technology partners and platforms should be guided by demonstrated CMVP listings, support for current FIPS publications, and a commitment to continuous compliance through updates and lifecycle management.

Top 5 Platforms for FIPS Compliance

Organizations pursuing FIPS compliance require technology partners and platforms that offer validated cryptographic modules, documentation, and deployment flexibility appropriate for government and critical infrastructure environments. The following five platforms are recognized for their robust support of FIPS-compliant security:

Microsoft Azure Government

Offers dedicated cloud services for U.S. government agencies with FIPS 140-2 validated cryptographic modules across compute, storage, and networking, enabling compliant workloads at scale.

Amazon Web Services (AWS) GovCloud

Provides a FedRAMP-authorized environment with FIPS 140-2 validated endpoints for key security services such as storage, databases, and encryption, simplifying compliance for federal workloads.

Google Cloud Platform (GCP) Assured Workloads

Delivers secure cloud infrastructure, including FIPS-validated encryption and compliance controls, tailored to public sector and regulated customers.

Cisco Secure Firewall and VPN Solutions 

Integrate FIPS 140-2 and FIPS 140-3 validated cryptographic modules for secure on-premises and hybrid network environments, supporting compliance for agencies and infrastructure providers.

BlackBerry Secure Communications 

Enables government-grade, sovereign-controlled secure communications with validated cryptography for mobile device management, secure voice, text, and emergency response across endpoints.

Getting Started on the Path to Compliance

Begin with a comprehensive inventory of all cryptographic modules and configurations in use across your organization. Confirm the status of validation certificates, applicable versions, and operational modes against the CMVP listing. Prioritize the remediation or replacement of any non-validated modules and embed compliance checks into procurement, engineering, and deployment workflows. Sustained monitoring should be implemented to ensure ongoing validation through technology changes, software updates, and evolving requirements.

A systematic approach to FIPS compliance can help reduce risk, facilitate regulatory and customer assurance, and establish a repeatable capability for protecting sensitive information across critical environments.

FAQ

Is FIPS compliance mandatory?

Use of FIPS-validated cryptographic modules is required for U.S. federal agencies when managing sensitive but unclassified data. Requirements generally extend to contractors and vendors by contract or program clause, and are widely adopted in other high-assurance sectors.

Which publications are included under FIPS?

Major FIPS standards include FIPS 140 (cryptographic modules), FIPS 180 (secure hashing), FIPS 197 (encryption), and FIPS 201 (identity), all published and maintained by NIST.

How does FIPS coordinate with other compliance frameworks?

FIPS standards underpin requirements across numerous frameworks, including FedRAMP, CJIS, HIPAA (when tied to federal programs), and state government mandates, specifying approved cryptography and operational security practices.

What types of compliance obligations exist?

FIPS obligations fall under regulatory (legislated), contractual (agreed with customers or partners), and internal (corporate policy) domains, depending on the environment and risk profile.

BlackBerry for Secure Communications

Sovereign communication systems built to secure mission-critical conversations. No third-party exposure. No weak links. BlackBerry delivers trusted, government-grade security for when the stakes are the highest.