Examples of Cryptographic Modules in a sentence
The data shall be encrypted in accordance with FIPS 140-2 Security Requirements for Cryptographic Modules and shall not be stored on systems that are shared with other commercial or Government entities.
To transmit sensitive information, the Contractor shall use FIPS 140-2 Security Requirements for Cryptographic Modules compliant encryption methods to protect sensitive information in attachments to email.
Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment.
Examples of such requirements are The Office of Management and Budget (OMB) Circular A-130, The Federal Information Security Management Act (FISMA), NIST FIPS PUB 140-2 Security Requirements for Cryptographic Modules, the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP), and the National Information Assurance Certification and Accreditation Process (NIACAP) NSTISSI-1000.
Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules.
Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.
Encryption must be via an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules per GSA policy.
Applicant must confirm that all Protected Health Information (PHI) and Personally Identifiable Information (PII) is encrypted - both at rest and in transit - employing the validated Federal Information Processing Standards (FIPS) Publication 140-2 Cryptographic Modules.
Applicant must confirm that all Protected Health Information (PHI) and Personally Identifiable Information (PII) is encrypted – both at rest and in transit – employing the validated Federal Information Processing Standards (FIPS) Publication 140-2 Cryptographic Modules.