Titaniam

Sinet Innovator
FIPS 140-2 Certified
Global Infosec Winner 2022
Intellyx Digital Innovator 2022
TagCyber 2022
Hype Cycle for Data Privacy
Hype Cycle for Data Security
Enterprise Key Management Report

What is FIPS 140 and what does it mean to be “FIPS compliant”?

FIPS was developed by the Computer Security Division of the National Institute of Standards and Technology (NIST). It established a data security and computer system standard that businesses must follow in accordance with the Federal Information Security Management Act of 2002. (FISMA). Federal government organizations in the United States are required by FISMA to minimize information technology risk to an acceptable level at a fair cost.

The Federal Information Security Modernization Act of 2014 (FISMA2014), which replaced FISMA in 2014, changed several of its original provisions to reflect the evolving nature of cybersecurity requirements and the need for supervision.

To be FIPS compliant (FIPS), organizations must follow the different data security and computer system standards described in the Federal Information Processing Standards.

A U.S. government agency or contractor’s computer systems must satisfy the criteria listed in the FIPS publications with the numbers FIPS 140, FIPS 180, FIPS 186, FIPS 197, FIPS 198, FIPS 199, FIPS 200, FIPS 201, and FIPS 202 to be considered FIPS compliant. In this blog, we will be focusing on FIPS 140.

“Security Requirements for Cryptographic Modules” according to FIPS 140

When creating, putting into use, and running cryptographic modules, the FIPS 140 standard is followed. The combination of hardware, software, and/or firmware known as a cryptographic module implements security features such as algorithm execution and key creation. The techniques for validating and testing the modules are also outlined in the standard.

The security standards cover cryptographic module interfaces, software and firmware security, operating environment, physical security, security parameter management, self-tests, attack mitigation, roles, services, and authentication. The cryptographic modules used by federal departments and agencies must pass testing to ensure they meet these requirements before they may be used.

FIPS Compliance Levels

“Level 1” through “Level 4” are the four security levels that are specified by FIPS 140-2. The levels rise, but they don’t always grow on top of one another. Additional testing is performed on a higher level for the level’s use case.

FIPS Level 1 is the first level of strong security certified by the FIPS standard. This level has  fundamental security requirements for the cryptography module and the algorithms contained therein. Beyond the fundamental necessity for production-grade components, a Security Level 1 cryptographic module does not include any additional physical security features. PC encryption boards are an illustration of a Security Level 1 cryptographic module.

FIPS Security Level 2 requires  additional physical security mechanisms on top of the Security Level 1 cryptographic module by mandating elements that demonstrate tampering, such as tamper-evident coatings or seals that must be broken to gain physical access to cryptographic keys and critical security parameters (CSPs) within the module, or pick-resistant locks on covers or doors to prevent unauthorized physical access.

FIPS Security Level 3 makes an effort to stop intruders from accessing CSPs stored within the cryptographic module in addition to the tamper-evident physical security measures necessary at Security Level 2. At Security Level 3, physical security procedures are necessary. These mechanisms are designed to be very likely to detect and react to attempts at physical access, use, or modification of the cryptographic module. Strong enclosures and tamper-detection/response circuitry that zeroes all plaintext CSPs when the removable covers/doors of the cryptographic module are opened are two examples of physical security measures that could be used.

FIPS Security Level 4 offers a maximum level of security. To this degree, the physical security mechanisms surround the cryptographic module completely, serving as a barrier to prevent any illegal attempts at physical access from being made. There is a very high likelihood that any attempt to breach the enclosure of the cryptographic module will be identified, in which case all CSPs that include plaintext will be deleted immediately.

Cryptographic modules with Security Level 4 are helpful for use in areas without physical protection. A cryptographic module is shielded by Security Level 4 from security breaches brought on by external factors or variations outside the module’s typical working limits for voltage and temperature. Attackers may utilize deliberate deviations from the regular operating ranges to get around a cryptographic module’s defenses. For a reasonable assurance that the module won’t be impacted by fluctuations outside of the normal operating range in a way that can jeopardize the module’s security, a cryptographic module must either undergo rigorous environmental failure testing or include special environmental protection features designed to detect fluctuations and delete CSPs.

Utilizing FIPS 140 Validated Solutions to Secure Enterprise Data 

Enterprises store, transact, and analyze large volumes of data and have an obligation to keep this data secure and private at all times. Enterprise data can exist in three states (at-rest, on-transit, and in-use) during its lifecycle and as it journeys through the enterprise and its network of suppliers and partners. Data at-rest and in-use can greatly benefit from the use of FIPS 140-2 validated encryption.

  • Securing Data-at-Rest: Applying FIPS 140-2 validated encryption to data-at-rest i.e that is stored and not in active use, ensures that unauthorized entities cannot read the data even if they have access to the data files. The use of FIPS 140-2 validated encryption guarantees the strength of the underlying algorithms. 
  • Securing Data-in-Use: Although data-in-use encryption is a relatively new area, we now have techniques that can keep valuable data encrypted even when it is actively being utilized by databases and applications. Depending on the specific encryption-in-use methodology, this can be secured using FIPS 140-2 validated encryption.  

Specific areas where FIPS 140-2 validated encryption can be used to secure enterprise data are: data-at-rest for all types of databases, repositories, both structured and unstructured; for FIPS 140-2 validated data-in-use encryption (encryption-in-use), this is now available for a large variety of databases, enterprise search platforms, object stores, and file shares via Titaniam. 

Many of these platforms such Enterprise Search platforms like Elasticsearch and OpenSearch must index and persist large amounts of clear text data for searches and analytics. These platforms are ideal prey for data-hungry ransomware and extortion criminals, who either hunt for improperly configured clusters or steal admin credentials. Similarly, misconfigured or commonly accessible AWS S3 buckets are another major source of data compromise.

How do we stop these attacks? Titaniam, a data protection solution that can ensure that valuable data will not get compromised, even if attackers break in successfully and leave with it, is the only encryption-in-use solution with NIST FIPS 140-2 certification for all underlying algorithms. 

Titaniam distinguishes itself by offering functional capabilities equivalent to at least three other data security solutions in addition to the state-of-the-art encryption-in-use. Multiple privacy preserving formats such as Tokenization, data masking, or general-purpose encryption are combined with high-performance encryption-in-use and are all included in the same package at no extra cost to businesses using Titaniam for encrypted processing and ransomware protection. Titaniam is one of the most practical options in the CISO’s toolkit today and is faster than its closest competitors, while offering wider coverage at a fraction of the cost. In addition, Titaniam offers a robust key management infrastructure, including integrations to significant key vaults, field-level key derivation, index-specific keys, and keystore integrations (allowing BYOK).

The Titaniam FIPS 140-2 Validated Product Suite: 

Titaniam FileShare Security: For file servers and other systems used for file sharing, Titaniam offers always-on encryption. Regardless of privilege, Titaniam ensures that all files are always protected with NIST FIPS 140-2 verified strong encryption and that unencrypted data is never directly accessible via the file share.To learn more about functionality, read more here.

Titaniam Object Store Proxy: Titaniam Proxy offers transparent application-level NIST FIPS 140-2 approved encryption for cloud object stores. Titaniam encryption offers total data security even if the organization is the target of an attack, while native cloud platform encryption protects data against compromise on the cloud provider. Full details on Titaniam Object Store Proxy can be found here.

Titaniam Vault: Titaniam Vault is a stand-alone data vault that can analyze and store both structured and unstructured data while maintaining strong NIST FIPS 140-2 encryption without ever needing to decode data, even when it’s being processed in memory or the computer’s hardware.To find out the full extent of the Vault’s capabilities, read more here.

Titaniam Plugin: Without compromising search efficiency or limiting fully featured search options, Titaniam Plugin secures sensitive data inside of the most popular enterprise search systems. For all versions of Elasticsearch, OpenDistro, and OpenSearch on AWS/Azure, Titaniam Plugin is accessible.Check out more on the high-performance capabilities of the Plugin here.

Titaniam API/Translation service: The Titaniam API service can be used independently or in conjunction with any other Titaniam products to produce a high-quality data translation solution. Existing applications can resist ransomware and other data-related threats with the Titaniam Translation Service alone. Additionally, it can guarantee that downstream applications can quickly translate protected data exiting other Titaniam products into clear text or other private formats. The Titaniam API enables other Titaniam-protected systems to be completely locked down, in line with the Zero Trust Data security standard, from the nine secure and private formats (including searchable encryption) and types of data, including keywords, text, numbers, dates, IP Addresses, Binary and PII-specific data types.

Titaniam Studio: The Studio also offers a management interface for other Titaniam products. In the event of a successful attack, it offers dashboards, analytics, and granular compliance certifications. CISOs can see first hand how Titaniam Studio reports as auditable proof that their data maintained encryption throughout the attack by clicking here.

The Importance of Being FIPS Compliant

All users should be informed of the value of security awareness and the necessity of making information security a management priority. Organizations should identify their information resources and assess the sensitivity to and potential impact of losses because information security needs vary from application to application. The selection of available controls, such as administrative policies and procedures, environmental and physical controls, information and data controls, software development and acquisition controls, and backup and contingency planning, should be based on probable risks. Titaniam covers all bases as the only encryption-in-use solution with NIST FIPS 140-2 certification.

To browse our suite of FIPS 140-2 validated products, view our product page here.