Deep diveGLOBAL

FIPS 140-3 Module boundary and services mapping

Define the cryptographic boundary correctly and build a services map that makes approved mode provable.

This is where many CMVP projects succeed or fail: boundary discipline plus service-to-function traceability.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
6

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

In FIPS 140-3, the module boundary and the services map are the backbone of the entire validation. The Security Policy, lab test plan, approved-mode story, SSP handling, self-tests, and operational-environment scope all have to match them. This guide explains how to define the boundary and services in a way that survives CSTL scrutiny and CMVP review.

Section 1

Start with the object of conformity

FIPS 140-3 validates a cryptographic module. That module may be software, firmware, hardware, or a hybrid, but you must be able to describe exactly what that object is and where its boundary sits.

Boundary mistakes are expensive because they force rework across documentation, testing, and release control. Treat boundary definition as an architecture decision with formal ownership.

  • Define the module embodiment: software, firmware, hardware, or hybrid
  • Define where approved security functions execute
  • Define what is explicitly excluded from the module
  • Pin versions and tested environments so the boundary maps to a specific release
Section 2

What a good boundary diagram must show

A boundary diagram is not decorative. It is a contract between engineering, documentation, tests, and customer claims. It should be versioned and used consistently everywhere.

  • Clear perimeter showing in-scope and out-of-scope components
  • Every interface that crosses the boundary, including APIs, ports, admin channels, and debug paths
  • Roles and operator entry points
  • Where SSPs exist in memory, storage, or hardware-backed stores
  • What happens to module behavior when self-tests fail
Section 3

Build a services inventory before you argue about approved mode

The services inventory should enumerate every callable service and every security-relevant function the module provides. Each service should have a stable identifier so the mapping remains consistent across code, documentation, and tests.

The purpose of the inventory is to eliminate ambiguity. If a service could be interpreted as a security function, the inventory must classify it clearly and explain how it behaves in approved and non-approved states.

  • Service identifier, name, and short description
  • Roles allowed to invoke the service
  • Inputs and outputs, including any SSP exposure
  • Approved-mode behavior and non-approved behavior
  • Underlying approved security functions used by the service
  • Evidence links such as test case IDs, logs, config references, or policy sections
Section 4

Map services to approved security functions in a testable way

A strong map lets the lab see which services are in scope, which are approved in approved mode, which algorithms and self-tests support them, and how SSP protection applies.

Current Implementation Guidance places a lot of weight on consistency. Approved service indicators must not imply approval if the necessary conditions for approved operation are not actually met.

  • Map each service to approved functions or explicitly mark it non-approved
  • Tie each service to required self-tests and error-state behavior
  • Map each service to SSP access and zeroization expectations
  • Tie each service to the evidence artifacts that prove the claim
  • Define one approved-mode narrative and keep it consistent across all services
Section 5

Handle embedded or bound modules without overclaiming

If you embed or bind to other validated modules, boundary clarity becomes even more important. Current CMVP FAQ and guidance materials distinguish your module under test from any embedded validated module it relies on.

The common failure is overclaiming. A product that uses an embedded validated module is not automatically itself validated. Another failure is vague documentation that prevents the lab from telling what your own module actually does versus what the embedded module contributes.

  • Identify embedded or bound modules precisely with exact certificate and version information
  • Represent your module functionality separately from embedded functionality
  • Only cite embedded functionality the module actually uses
  • Keep marketing language aligned with the actual certificate scope
Section 6

Deliver a boundary-to-evidence blueprint

The easiest way to reduce rework is to create a single boundary-to-evidence blueprint that engineering, documentation, QA, and the CSTL can all use. That blueprint should combine the boundary, services inventory, SSP map, approved-mode rules, and evidence references in one controlled place.

  • Boundary diagram and interface inventory
  • Roles, services, and authentication matrix
  • Approved-mode definition and service indicator behavior
  • SSP lifecycle map and zeroization evidence plan
  • Evidence register with ownership and update rules
Recommended next step

Keep FIPS 140-3 Module boundary and services mapping in one governed evidence system

SSOT can take FIPS 140-3 Module boundary and services mapping from reusing this material inside a governed evidence system to a reusable workflow inside Sorena. Teams working on FIPS 140-3 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

csrc.nist.gov
Referenced sections
  • Official clarification that products using embedded validated modules are not automatically themselves validated.
Related guides

Explore more topics