Glossary · Regulatory & frameworks

FIPS 140-2

What FIPS 140-2 is, what its security levels mean, and how XVICA satisfies FIPS 140-2 obligations in regulated UK, US, and Commonwealth deployments.

Definition

FIPS 140-2 is a US federal standard published by NIST that specifies security requirements for cryptographic modules used to protect sensitive but unclassified information. It defines four ascending security levels (1 through 4) that cover physical security, role-based authentication, key management, and tamper evidence. Modules undergo independent laboratory validation through the Cryptographic Module Validation Program (CMVP) and, when validated, are listed publicly with their assurance level and operational scope. While FIPS 140-3 supersedes 140-2 going forward, 140-2 modules remain widely deployed and accepted across US federal, regulated UK financial services, and Commonwealth public-sector environments.

01Why it matters

In high-stakes deployments

FIPS 140-2 is the most widely cited cryptographic-module assurance standard in regulated procurement. US federal contracts often mandate it; financial-services and healthcare contracts frequently inherit it as a baseline; UK and Australian public-sector engagements treat it as a default expectation for HSM-backed key management. A system that handles cryptographic operations on sensitive data without using a validated module exposes the operator to procurement disqualification, audit findings, and — in the worst case — regulatory enforcement.

02In practice

How XVICA treats this

XVICA-built infrastructure uses FIPS 140-2 validated modules (typically Level 2 or Level 3 HSMs) for any cryptographic operation that handles regulated data, signs records that may be presented as evidence, or protects keys whose compromise would constitute a notifiable event. Module validation is verified at procurement; firmware versions are tracked against the CMVP active validation list; key rotation, quorum recovery, and segregation of duties are enforced operationally. The choice between 140-2 and 140-3 is made deliberately per deployment based on the customer's regulatory environment.

Security infrastructure capability

Discuss FIPS 140-2 in your context.

Request a confidential briefing on how this concept applies to your infrastructure objectives.

Request a private briefing