What Is FIPS Mode? (2024)

What Is FIPS Mode? (1)What Is FIPS Mode? (2)

In a prior article, we explained what the Federal Information Processing Standards (FIPS) are and how to determine FIPS compliance. In this article, we’ll explain what FIPS mode is and how enabling FIPS mode on networks and/or devices can make systems FIPS compliant.

What Are the Federal Information Processing Standards?

The Federal Information Processing Standards (FIPS) are a set of federal security standards designed for protecting sensitive data and systems leveraged by U.S. government agencies and the contractors and vendors they work with. They’re specifically meant to inform the operation of cryptographic modules—algorithms that encrypt data stored within the system or device.

Encryption modules for information technology and computer security programs that are running in FIPS mode will perform Federal Information Processing Standards-compliant functions such as key generation, encryption, and decryption.

What Is NIST?

The National Institute of Standards and Technology (NIST) is a U.S. government laboratory that works to promote the economic security of the country by developing security standards that counter digital theft and cybersecurity threats.

Security standards issued by the laboratory are considered excellent default security measures, even for non-federal agencies not required to operate in FIPS mode for compliance.

Overview of FIPS and Its History

Federal Information Processing Standards were first created by NIST in 1974. FIPS compliance provides rigorous standards for IT and computer security. Specifically, it’s concerned with the compliance of an application or product’s encryption modules, designed to protect data in transit or at rest. The standards were designed by NIST to improve data security of sensitive data.

Learn more about FIPS compliance and how it’s determined.

What Is FIPS Mode?

FIPS mode is a configuration option for systems (e.g., software, operating systems, SIEM solutions) and hardware (e.g., routers, data storage). When these specific FIPS security features are being implemented, the device or system is running in FIPS mode and is typically considered to be Federal Information Processing Standards compliant. (For Federal Information Processing Standards 140-2, additional parameters may be required for compliance).

What Happens in FIPS Mode?

When a device or system and its components are running in FIPS mode, they’re only using Federal Information Processing Standards-compliant algorithms and libraries for cryptography. In some cases, they may also run additional data protection features. It also may mean that, while in FIPS mode, certain non-Federal Information Processing Standards compliant functions may be disabled or restricted.

Learn more about Pure’s government data center solutions!

U.S. Federal Standards for Security Controls

Can FIPS Mode Be Disabled?

Yes, FIPS mode can be disabled. When Federal Information Processing Standards mode is disabled, non-Federal Information Processing Standards compliant functions are no longer restricted.

What Technology Can Be Put in FIPS Mode?

Any technology or system that can run Federal Information Processing Standards-compliant encryption algorithms or operations can be put into Federal Information Processing Standards mode.

Hardware That Can Be Put in Federal Information Processing Standards Mode

The types of hardware that can be put into Federal Information Processing Standards mode include hardware that performs cryptographic functions, such as:

  • Data storage arrays (e.g., self-encrypting drives)
  • Network devices, such as routers, firewalls, and network switches
  • Security devices

Software That Can Have Federal Information Processing Standards Mode Enabled

The types of software that can have Federal Information Processing Standards mode enabled include systems or software that run encryption modules, such as:

  • Operating systems
  • Encryption software
  • Virtual private networks (VPNs)
  • SIEM software or network intrusion detection systems

What Networks and Industries Need FIPS Mode?

The networks or industries that need FIPS mode are contractually obligated to and are typically those networks within the United States handling classified information for the U.S. government. These can include:

  • Federal and government networks
  • Law enforcement, national security, and national defense networks
  • Healthcare networks
  • Military networks
  • Critical infrastructure, including the utilities sector, energy, power, and power grid networks

FIPS Mode vs. Being FIPS Validated

FIPS mode is a specific configuration or setting that is enabled, while being Federal Information Processing Standards validated means a system or device has undergone the formal Federal Information Processing Standards validation testing process. For example, a device can be Federal Information Processing Standards validated but not necessarily running in FIPS mode.

Conclusion

FIPS mode is a very specific configuration for devices and systems that must be Federal Information Processing Standards compliant, but it’s important to note that it is not a catchall nor will it be appropriate for every device or system.

Not all data storage devices are able to be Federal Information Processing Standards compliant or run in FIPS mode. If you need a Federal Information Processing Standards-compliant data storage device, look for a storage array that explicitly notes Federal Information Processing Standards compliance in its system documentation (e.g., technical specs and user manuals) or check a vendor’s documentation or reach out to technical support.

What Is FIPS Mode? (3)

What Is FIPS Mode? (2024)

FAQs

What is the FIPS mode? ›

When a device or system and its components are running in FIPS mode, they're only using Federal Information Processing Standards-compliant algorithms and libraries for cryptography. In some cases, they may also run additional data protection features.

How do I get my computer out of FIPS mode? ›

In Security Settings, expand Local Policies, and then click Security Options. Under Policy in the right pane, double-click System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing, and then click Disabled.

How to bypass FIPS mode? ›

About exiting FIPS mode

For the device to exit FIPS mode, you can use one of the following reboot methods: Automatic reboot—The system automatically creates a default non-FIPS configuration file named non-fips-startup. cfg, specifies the file as the startup configuration file, and reboots to enter non-FIPS mode.

How do I know if FIPS mode is enabled? ›

To verify FIPS mode:
  1. $ fips-mode-setup --check FIPS mode is enabled.
  2. $ sysctl crypto.fips_enabled crypto.fips_enabled = 1.
  3. $ cat /proc/sys/crypto/fips_enabled 1.

What FIPS means? ›

FIPS (Federal Information Processing Standards) are a set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies. Learn More.

How do I change FIPS mode? ›

NOTE: When enabling FIPS mode on the device, review all the warning messages that are displayed on the SMS.
  1. On the SMS, select Devices > All Devices > device, and then click Device Configuration.
  2. Select FIPS Settings.
  3. Select FIPS Mode Enabled.
  4. Click OK.

Should I enable or disable FIPS? ›

FIPS mode doesn't do anything to other applications unless they obey this setting. You shouldn't enable this setting unless you're using a government computer and are forced to. If you do enable this setting, some consumer applications may actually ask you to disable FIPS mode so they can function properly.

What causes a FIPS error? ›

Someone installing an EMG patch that is not FIPS certified can cause an error state. Failure of boot time integrity checks can cause an error state.

How to get out of FIPS mode in PDF? ›

Turn FIPS mode on or off
  1. Log in to Administration Console.
  2. Click Settings > Core System Settings > Configurations.
  3. Select Enable FIPS to enable FIPS mode or deselect it to disable FIPS mode.
  4. Click OK and restart the application server.

Do I need FIPS? ›

All federal agencies, their contractors, and service providers must all be compliant with FIPS as well. Additionally, any systems deployed in a federal environment must also be FIPS 140-2 compliant.

Why we're not recommending FIPS mode? ›

The non-FIPS versions have been available much longer (and so are used more widely) and are usually much faster. If FIPS mode is enabled, the non-FIPS algorithms throw an error and the application fails. So basically, if FIPS mode is enabled, most applications using cryptographic functionality fail.

What is the FIPS-mode-setup command? ›

When enabling FIPS mode, fips-mode-setup completes the installation of FIPS modules (if needed) by calling fips-finish-install and changing the system cryptographic policy to FIPS. The command then modifies the boot loader configuration to add fips=1 and boot=<boot-device> options to the kernel command line.

What does Cisco FIPS mode do? ›

The FIPS specifies best practices for implementing cryptographic algorithms, handling key material and data buffers, and working with the operating system. The Cisco Common Cryptographic Module (C3M) provides cryptographic services to a wide range of the networking and collaborationproducts of Cisco.

Why do I need FIPS? ›

Enhances data protection: FIPS sets high standards, which are necessary to protect data. Federal government agencies store, use and share large amounts of sensitive information across different devices and systems, and it's only reasonable to put the best possible security measures in place.

What is FIPS mode in PDF? ›

Foxit PDF Editor provides a FIPS mode to make data protection compliant with Federal Information Processing Standard (FIPS). FIPS mode uses FIPS 140-2 approved algorithms to establish requirements for various purposes including the cryptographic modules of software and hardware.

References

Top Articles
Latest Posts
Article information

Author: Nathanial Hackett

Last Updated:

Views: 6180

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Nathanial Hackett

Birthday: 1997-10-09

Address: Apt. 935 264 Abshire Canyon, South Nerissachester, NM 01800

Phone: +9752624861224

Job: Forward Technology Assistant

Hobby: Listening to music, Shopping, Vacation, Baton twirling, Flower arranging, Blacksmithing, Do it yourself

Introduction: My name is Nathanial Hackett, I am a lovely, curious, smiling, lively, thoughtful, courageous, lively person who loves writing and wants to share my knowledge and understanding with you.