Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
60 changes: 33 additions & 27 deletions content/nginx/fips-compliance-nginx-plus.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,36 +24,42 @@ Some industries such as finance, healthcare, energy, also adopt FIPS to enhance

Currently, both FIPS 140-2 and FIPS 140-3 certifications are accepted. However, FIPS 140-2 is being phased out as part of the [FIPS 140-3 transition plan](https://csrc.nist.gov/projects/fips-140-3-transition-effort). After September 22, 2026, only FIPS 140-3 certifications will be recognized. Organizations are encouraged to migrate to FIPS 140-3 to meet updated cryptographic security requirements.

{{<bootstrap-table "table table-striped table-bordered table-sm">}}
| **Program/Regulation/Industry** | **FIPS 140-2/140-3 Requirement** | **Current Status** |
|---------------------------------|----------------------------------|---------------------------------------------------------------------|
| CJIS | 140-2 or 140-3 | FIPS required for systems protecting criminal justice data. |
| CMMC | 140-2 or 140-3 | FIPS required for Levels 2 and 3 compliance. |
| Common Criteria | 140-2 or 140-3 | Evaluations reference both FIPS versions for cryptographic security. |
| Critical Infrastructure | 140-2 or 140-3 | Utilities and systems accept both versions depending on deployments. |
| Department of Veterans Affairs| 140-2 or 140-3 | Both versions used for securing sensitive health and personal data. |
| DFARS | 140-2 or 140-3 | Cryptographic modules for CUI must be FIPS compliant. |
| DoDIN APL | 140-2 or 140-3 | Approved IT products must include FIPS validation. |
| FAA | 140-2 transitioning to 140-3 | 140-2 modules common in existing systems; new systems use 140-3. |
| FERPA | 140-2 or 140-3 | Federal-funded educational systems align with 140-2 or 140-3. |
| FedRAMP | 140-2 or 140-3 | FIPS required for encryption; both versions accepted. |
| FISMA | 140-2 or 140-3 | Both versions accepted; agencies adopt existing 140-2 modules. |
| HIPAA | 140-2 or 140-3 | FIPS ensures encryption for ePHI; both versions are valid. |
| HITECH | 140-2 or 140-3 | FIPS use aligns with encryption best practices for ePHI. |
| Intelligence Community | 140-2 transitioning to 140-3 | Current systems mostly use 140-2; newer systems adopt 140-3. |
| Military & Tactical Systems | 140-2 transitioning to 140-3 | 140-2 used widely; transitioning to 140-3 certifications for future tools.|
| NSA CSfC | 140-2 transitioning to 140-3 | NSA accepts 140-2 but prefers newer certifications under 140-3. |
| Nuclear Regulatory Commission | 140-2 or 140-3 | Cryptography for nuclear systems relies on both versions. |
| PCI DSS | 140-2 or 140-3 | Both versions recommended but not mandatory. |
| State and Local Gov Programs | 140-2 or 140-3 | FIPS required for federal grant-funded security systems. |
| TSA | 140-2 or 140-3 | Best practice for cryptographic protection; both versions accepted. |
{{< /bootstrap-table >}}
{{< table >}}
| **Sector / Program** | **Version** | **Status** |
|--------------------------------|----------------|---------------|
| **Federal Programs** | | |
| CJIS | 140-2 or 140-3 | Mandatory |
| FedRAMP | 140-2 or 140-3 | Mandatory |
| FISMA | 140-2 or 140-3 | Mandatory |
| DFARS | 140-2 or 140-3 | Mandatory |
| DoDIN APL | 140-2 or 140-3 | Mandatory |
| FAA | 140-2 to 140-3 | Transitioning |
| TSA | 140-2 or 140-3 | Recommended |
| **Defense & Intelligence** | | |
| CMMC | 140-2 or 140-3 | Mandatory |
| Intelligence Community | 140-2 to 140-3 | Transitioning |
| NSA CSfC | 140-2 to 140-3 | Transitioning |
| Military & Tactical Systems | 140-2 to 140-3 | Transitioning |
| **Healthcare & Education** | | |
| HIPAA | 140-2 or 140-3 | Mandatory |
| HITECH | 140-2 or 140-3 | Mandatory |
| Department of Veterans Affairs | 140-2 or 140-3 | Mandatory |
| FERPA | 140-2 or 140-3 | Recommended |
| **Commercial/Private Sector** | | |
| PCI DSS | 140-2 or 140-3 | Recommended |
| Common Criteria | 140-2 or 140-3 | Recommended |
| **Infrastructure & Critical Systems** | | |
| Critical Infrastructure | 140-2 or 140-3 | Recommended |
| Nuclear Regulatory Commission | 140-2 or 140-3 | Recommended |
| **State & Local Government** | | |
| State and Local Gov Programs | 140-2 or 140-3 | Mandatory |
{{< /table >}}

### FIPS compliance in other countries

Although FIPS 140 is primarily a North American government cryptographic standard, it is widely recognized as a global benchmark for cryptographic security. Numerous countries outside North America align their cryptographic requirements with FIPS, especially in regulated sectors such as finance, defense, healthcare, and critical infrastructure.

{{<bootstrap-table "table table-striped table-bordered table-sm">}}
{{< table >}}
| Country/Region | FIPS Use |
|----------------|-----------------------------------------------------------------------------|
| Australia | Referenced for government, defense, and cryptography systems. |
Expand All @@ -74,7 +80,7 @@ Although FIPS 140 is primarily a North American government cryptographic standar
| UAE | Trusted in finance, energy, and interoperability with the U.S. cryptography.|
| United Kingdom | Referenced for defense, health, and procurement standards. |
| United States | Mandatory for federal government systems and contractors. |
{{< /bootstrap-table >}}
{{< /table >}}

## FIPS compliant vs FIPS validated

Expand Down Expand Up @@ -129,7 +135,7 @@ The process uses Red Hat Enterprise Linux (RHEL) release 9.6 as an example and c

### Step 1: Configure the operating system to use FIPS mode {#os-fips-setup}

For the purposes of the following demonstration, we installed and configured a RHEL 9.6 server. The [Red Hat FIPS documentation](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/chap-federal_standards_and_regulations#sec-Enabling-FIPS-Mode) explains how to switch the operating system between FIPS mode and non‑FIPS mode by editing the boot options and restarting the system.
For the purposes of the following demonstration, we installed and configured a RHEL 9.6 server. The [Red Hat FIPS documentation](https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/switching-rhel-to-fips-mode_security-hardening) explains how to switch the operating system between FIPS mode and non‑FIPS mode by editing the boot options and restarting the system.

For instructions for enabling FIPS mode on other FIPS‑compliant Linux operating systems, see the operating system documentation, for example:

Expand Down