FIPS (Federal Information Processing Standard) 140-2 is a U.S. government standard that describes the encryption and related security requirements that IT products should meet for sensitive, but unclassified, use.
The standard ensures that a product uses sound security practices, such as approved, strong encryption algorithms and methods. It also specifies how individuals or other processes must be authorized in order to utilize the product, and how modules or components must be designed to securely interact with other systems.
Hard disk drives are constantly retired (returned for warranty, repair and expired lease agreements, or repurposed for other storage duties or sold), lost or stolen. When unprotected data leaves the owner’s control and is compromised, a company faces losing revenue, market share and customer confidence. They may even be subject to civil penalties due to violation of data privacy regulations. This can be catastrophic for any organization, and especially for SMBs.
According to industry experts such as the Ponemon Institute, the average cost per data breach increases every year, and on average was US$6.6 million in 2008, or US$202 per compromised record.1
The Ponemon Institute further estimates that 81 percent of laptops contain sensitive data, and as many as 10 percent of all laptops are lost or stolen during their lifetime. Additionally, it is estimated that every week 12,000 laptops are lost or stolen in U.S. airports alone. The average cost to a business when a laptop containing sensitive yet unencrypted data disappears is nearly US$50,000. In extreme cases, the costs can be nearly US$1 million.2
FIPS 140-2 defines four levels of security. FIPS 140-2 validation will specify the security level to which the product adheres.
Seagate ® Self-Encrypting Drive (SED) storage devices are validated as FIPS 140-2 Level 2 conformant.
Organizations of all types are increasingly demanding that data at rest be encrypted to protect against loss or theft. FIPS 140-2 Level 2 validation is viewed as a mark of security and quality, and certifies to all buyers that the Seagate FIPS SEDs meet the U.S. federal government requirements for security products.
FIPS 140-2 applies to any product that might store or transmit sensitive data. This includes hardware products like link encryptors, hard disks, flash drives or other removable storage media. It also includes software products that encrypt data during transit or while stored.
Operating system security such as a password can easily be bypassed by removing a hard disk and mounting it in another computer. Even BIOS ATA hard drive passwords have been found to be vulnerable if not used with something like a Seagate SED drive. Encrypting the data on the hard disk or storage medium is a well-proven way to protect it.
In the U.S., the National Institute of Standards and Technology requires all federal agencies to use FIPS 140-2 Level 2 Validated ™ products to secure data designated as Sensitive but Unclassifed within computer and telecommunications systems (including voice systems). 3 In Canada, the Communications Security Establishment (CSE) requires federal agencies to use FIPS 140-2 Level 2 Validated cryptographic modules to secure data designated as Protected Information (A or B) within computer and telecommunications systems (including voice systems). FIPS 140 validation is also a necessary precursor for a cryptographic product to be listed in the Canadian government’s ITS Pre-qualified Products List. 3 In the U.K., the Communications-Electronics Security Group recommends the use of FIPS 140 Validated cryptographic modules. 4
Civilian companies worldwide who contract to U.S., Canadian or U.K. federal government organizations that require FIPS 140-2 encryption compliance are also required to be compliant. Additionally, commercial companies-especially in finance, healthcare, education, and infrastructure (national security) verticals-are increasingly requiring FIPS 140-2 compliance throughout the world. These companies want to follow the highest standard in protecting data. They recognize the rigor that goes into a FIPS-140 certification, find it to be the preferred standard for security and choose to depend on this standard for their own encryption needs.
FIPS 140-2 validation is a testing and certification program that verifies that a product meets the FIPS 140-2 standard. NIST established the Cryptographic Module Validation Program (CMVP) to validate products against these requirements.
To be FIPS 140-2 Validated™, a product must adhere to the stated design and implementation requirements, and be tested and approved by one of 13 independent labs that have been accredited by NIST.
The 140 numbered FIPS publications are a series of security standards that specify requirements for cryptography modules. FIPS 140-1 was issued in 1994 but has been supplanted by FIPS 140-2, which is the current standard and was issued in 2001. FIPS 140-3 is a new version of the standard that has been under development since 2005. A draft was issued in December 2009, but will likely take a year or more before it supersedes FIPS 140-2.
NIST maintains a list of all commercially available products that have been FIPS 140-2 Validated. Go to http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm .
Seagate sales partners can use the FIPS 140-2 validation as an effective marketing tool to demonstrate quality and critical security features that other products do not have. It is an important differentiator for today’s security-minded buyers.
1 Ponemon Institute, 2008 Annual Study: U.S. Cost of a Data Breach, February, 2009, www.ponemon.org, as quoted in Data-breach costs rising, study finds, Ellen Messmer, Network World, 02/02/09.
2 Intel Study: Stolen Laptops Cost to Business; eWeek, April 23, 2009; Ponemon Institute Study, April 2009.
Seagate is helping the world's biggest game changers solve their toughest business and technical challenges through data storage innovation.
See what we can do for you.
Register to receive the latest Seagate customer case studies, industry insights, trend information and more.All fields are required
Please fill all fields before submitting the form
Thank you for connecting with us.