Use these guides to plan a defensible FIPS 140-3 validation: define the module boundary, choose the right security level, map services to approved security functions, and build the documentation and evidence a CST laboratory and the CMVP will actually use.
Grounded in FIPS 140-3, the CMVP program pages, the current FIPS 140-3 Management Manual, and current Implementation Guidance. FIPS 140-2 active modules remain usable for new systems only through 21 September 2026.
Jump to guidesDeep dive pages for implementation planning, controls, reporting, and evidence.
FIPS 140-3 Cryptographic Module Validation should be the shared entry point for your team. Route execution into Assessment Autopilot for live work and into Research Copilot when the artifact needs deeper research, evidence governance, or supporting analysis.