Cryptographic Module Security Policy

February 16, 2018

How Can We Help?

You are here:
< Back

A precise specification of the security rules under which a cryptographic module will operate, including the rules derived from the requirements of this standard (FIPS 140-2) and additional rules imposed by the vendor.
SOURCE: FIPS 140-2