What Is FIPS Mode? (2024)

In a prior article, we explained what the Federal Information Processing Standards (FIPS) are and how to determine FIPS compliance. In this article, we’ll explain what FIPS mode is and how enabling FIPS mode on networks and/or devices can make systems FIPS compliant.

What Are the Federal Information Processing Standards?

The Federal Information Processing Standards (FIPS) are a set of federal security standards designed for protecting sensitive data and systems leveraged by U.S. government agencies and the contractors and vendors they work with. They’re specifically meant to inform the operation of cryptographic modules—algorithms that encrypt data stored within the system or device.

Encryption modules for information technology and computer security programs that are running in FIPS mode will perform Federal Information Processing Standards-compliant functions such as key generation, encryption, and decryption.

What Is NIST?

The National Institute of Standards and Technology (NIST) is a U.S. government laboratory that works to promote the economic security of the country by developing security standards that counter digital theft and cybersecurity threats.

Security standards issued by the laboratory are considered excellent default security measures, even for non-federal agencies not required to operate in FIPS mode for compliance.

Overview of FIPS and Its History

Federal Information Processing Standards were first created by NIST in 1974. FIPS compliance provides rigorous standards for IT and computer security. Specifically, it’s concerned with the compliance of an application or product’s encryption modules, designed to protect data in transit or at rest. The standards were designed by NIST to improve data security of sensitive data.

Learn more about FIPS compliance and how it’s determined.

What Is FIPS Mode?

FIPS mode is a configuration option for systems (e.g., software, operating systems, SIEM solutions) and hardware (e.g., routers, data storage). When these specific FIPS security features are being implemented, the device or system is running in FIPS mode and is typically considered to be Federal Information Processing Standards compliant. (For Federal Information Processing Standards 140-2, additional parameters may be required for compliance).

What Happens in FIPS Mode?

When a device or system and its components are running in FIPS mode, they’re only using Federal Information Processing Standards-compliant algorithms and libraries for cryptography. In some cases, they may also run additional data protection features. It also may mean that, while in FIPS mode, certain non-Federal Information Processing Standards compliant functions may be disabled or restricted.

Learn more about Pure’s government data center solutions!

U.S. Federal Standards for Security Controls

Can FIPS Mode Be Disabled?

Yes, FIPS mode can be disabled. When Federal Information Processing Standards mode is disabled, non-Federal Information Processing Standards compliant functions are no longer restricted.

What Technology Can Be Put in FIPS Mode?

Any technology or system that can run Federal Information Processing Standards-compliant encryption algorithms or operations can be put into Federal Information Processing Standards mode.

Hardware That Can Be Put in Federal Information Processing Standards Mode

The types of hardware that can be put into Federal Information Processing Standards mode include hardware that performs cryptographic functions, such as:

  • Data storage arrays (e.g., self-encrypting drives)
  • Network devices, such as routers, firewalls, and network switches
  • Security devices

Software That Can Have Federal Information Processing Standards Mode Enabled

The types of software that can have Federal Information Processing Standards mode enabled include systems or software that run encryption modules, such as:

  • Operating systems
  • Encryption software
  • Virtual private networks (VPNs)
  • SIEM software or network intrusion detection systems

What Networks and Industries Need FIPS Mode?

The networks or industries that need FIPS mode are contractually obligated to and are typically those networks within the United States handling classified information for the U.S. government. These can include:

  • Federal and government networks
  • Law enforcement, national security, and national defense networks
  • Healthcare networks
  • Military networks
  • Critical infrastructure, including the utilities sector, energy, power, and power grid networks

FIPS Mode vs. Being FIPS Validated

FIPS mode is a specific configuration or setting that is enabled, while being Federal Information Processing Standards validated means a system or device has undergone the formal Federal Information Processing Standards validation testing process. For example, a device can be Federal Information Processing Standards validated but not necessarily running in FIPS mode.

Conclusion

FIPS mode is a very specific configuration for devices and systems that must be Federal Information Processing Standards compliant, but it’s important to note that it is not a catchall nor will it be appropriate for every device or system.

Not all data storage devices are able to be Federal Information Processing Standards compliant or run in FIPS mode. If you need a Federal Information Processing Standards-compliant data storage device, look for a storage array that explicitly notes Federal Information Processing Standards compliance in its system documentation (e.g., technical specs and user manuals) or check a vendor’s documentation or reach out to technical support.

What Is FIPS Mode? (1)

BUYER’S GUIDE, 14 PAGES

A Buyer’s Guide to Modern Virtualization

What Is FIPS Mode? (2)
What Is FIPS Mode? (2024)
Top Articles
Use a transaction ID to minimize duplicate conversions
What does it mean to hash data and do I really care? | Dataspace
Oldgamesshelf
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Craigslist St. Paul
Walgreens Pharmqcy
Room Background For Zepeto
Aiken County government, school officials promote penny tax in North Augusta
New Day Usa Blonde Spokeswoman 2022
Celsius Energy Drink Wo Kaufen
Matthew Rotuno Johnson
Pollen Count Central Islip
Https E24 Ultipro Com
Bjork & Zhulkie Funeral Home Obituaries
Craigslist Mpls Cars And Trucks
Napa Autocare Locator
Union Ironworkers Job Hotline
Www Craigslist Milwaukee Wi
Zalog Forum
Cta Bus Tracker 77
Days Until Oct 8
Gayla Glenn Harris County Texas Update
*Price Lowered! This weekend ONLY* 2006 VTX1300R, windshield & hard bags, low mi - motorcycles/scooters - by owner -...
Busted Campbell County
Marine Forecast Sandy Hook To Manasquan Inlet
Lakers Game Summary
Ice Dodo Unblocked 76
Plaza Bonita Sycuan Bus Schedule
Bellin Patient Portal
Rogue Lineage Uber Titles
Labcorp.leavepro.com
Saxies Lake Worth
Farm Equipment Innovations
Obituaries, 2001 | El Paso County, TXGenWeb
Marlene2295
Craigs List Jax Fl
Vlacs Maestro Login
91 Octane Gas Prices Near Me
Jeep Cherokee For Sale By Owner Craigslist
The Boogeyman Showtimes Near Surf Cinemas
Cl Bellingham
Wattengel Funeral Home Meadow Drive
Cox Outage in Bentonville, Arkansas
St Anthony Hospital Crown Point Visiting Hours
Obituaries in Hagerstown, MD | The Herald-Mail
Ezpawn Online Payment
412Doctors
Canada Life Insurance Comparison Ivari Vs Sun Life
Cult Collectibles - True Crime, Cults, and Murderabilia
Mountainstar Mychart Login
Skybird_06
Access One Ummc
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5306

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.