Administer > FIPS Configuration

FIPS Configuration

CSA has to be configured to be compliant with Federal Information Processing Standards (FIPS) 140-2. This section gives you detailed information on how to configure CSA for FIPS 140-2 Compliance.

For more information on the FIPS 140-2 standard see Security Requirements for Cryptographic Modules from the National Institute of Standards and Technology (NIST).

After you have configured CSA for FIPS 140-2 compliance, CSA uses or complies with the following:

  • RSA BSAFE Crypto software
  • Keystore and truststore: PKCS #12
  • Asymmetric algorithm: RSA
  • Symmetric-key algorithm: AES
  • Random number generation algorithm: HMAC DRBG (128-bit)
  • Hashing algorithm: SHA-256

This document provides the following information:

See the following guides for more information on FIPS 140-2 requirements:

  • CSA technical requirements for FIPS 140-2: CSA FIPS 140-2 Compliance Statement
  • Supported components and versions: Cloud Service Automation System and Software Support Matrix
  • Installation: Cloud Service Automation Installation Guide
  • Configuration: Cloud Service Automation Configuration Guide