-
Episode 10: Understanding FIPS 140-2
FIPS 140-2 is a standard developed for the U.S. Government by the National Institute of Standards and Technology (NIST). While it's a common requirement for data handling in government applications, it's being used in more places, and it's increasingly important to not just be compliant, but to be certified. Product Manager Jay White walks through what FIPS is, how we implement it in our wireless products, and how you can use it to shave anywhere from 4 to 6 months off of your product development timeline.
For more on FIPS 140-2, see our whitepaper:
https://www.lairdconnect.com/fips-140-2-white-paper
published: 03 Mar 2020
-
Understanding FIPS 140-2 & It's Necessity - FIPS Cryptography | Encryption Consulting
Understanding FIPS 140-2 & It's Necessity - FIPS Cryptography | Encryption Consulting
👉SUBSCRIBE
Be sure to subscribe and click that Bell Icon for notifications!
In this video, we are talking about FIPS 140-2 Compliance, their security levels, importance, and who needs to be FIPS compliant.
----------------------------------------------------------------------------------------------------------------------------------------------------------------
To know more about Encryption Consulting LLC, please visit-
https://www.encryptionconsulting.com/
For latest updates, follow us on-
LinkedIn - https://www.linkedin.com/company/encryptionconsulting/
Twitter - https://twitter.com/encryptioncons
Facebook - https://www.facebook.com/encryptionconsulting/
#FIPS #NIST #EncryptionConsulting #Compli...
published: 23 Feb 2022
-
FIPS 140-2 Compliance with Digi
FIPS 140-2 validation is required to ensure high levels of security in all cryptographic modules — hardware and software — used by U.S. and Canadian government agencies and contractors, as well as police forces, financial institutions, and any organization that must be HIPAA-compliant. However, any operation can comply with the standard to ensure safe handling of data and to prevent cyberattacks.
The great news is that it is easy to comply with the FIPS 140-2 standard with Digi devices by performing a simple firmware update, which is a straightforward change with Digi Remote Manager®. Watch our video to learn more about FIPS and how Digi’s FIPS 140-2 validated devices can support your needs.
Learn more:
• Complete end-to-end solution offerings: https://www.digi.com/products
• Digi Remot...
published: 03 Oct 2023
-
Achieving FIPS 140-2 Compliance with HashiCorp Vault
In this session, we'll go through the nuances of FIPS 140-2 compliance requirements and walk you through a solution that leverages HashiCorp Vault for secrets management in a FIPS140-2 compliant way.
#HashiCorp #HashiCorpVault #secretsmanagement #zerotrustsecurity
Speaker:
Cameron Huysmans
Regional Manager, Solutions Engineering, HashiCorp
If you liked this video and want to see more from HashiCorp, subscribe to our channel: https://www.youtube.com/c/HashiCorp?sub_confirmation=1
To learn more, visit our hands-on interactive lab environment, HashiCorp Learn: https://learn.hashicorp.com/
HashiCorp is the leader in multi-cloud infrastructure automation software. The HashiCorp software suite enables organizations to adopt consistent workflows to provision, secure, connect, and run any...
published: 26 May 2021
-
World's fastest FIPS 140-2
World's fastest FIPS 140-2 Level 3 certified Hardware Security Module with PCI Express Gen 2.0 - Industry’s Fastest and Most Cloud Ready HSM Family for Cloud Data Centers, Enterprise, Government & Ecommerce Applications
LiquidSecurity™ HSM family is a FIPS 140-2 level 2 and level 3 certified solution that provides elastic and centralized key management and key operation functionality. With 32 partitioned HSMs in a single physical HSM, 50,000 key store independent of key size, 35,000 2048b RSA ops/sec and chaining of up to 20 Appliances, LiquidSecurity CNL35xx family provides a solution that addresses requirements from few hundred RSA ops/sec or few key stores to 700K RSA ops/sec or 1M key store and everything in-between. This product family, available as a PCI Express adapter with complet...
published: 26 Aug 2010
-
OOKAS DT6000 - FIPS 140-2 Level 3 Military Grade Encryption.flv
published: 29 May 2012
-
FIPS 140-2 Compliant GitLab Runner Speed Run
Overview of the FIPS 140-2 Compliant GitLab Runner released in GitLab Runner 14.7
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27886
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28814
https://docs.gitlab.com/runner/install/
published: 17 Jan 2022
-
WEBINAR RECORDING: What is FIPS Cryptography? How to get FIPS 140 Compliance?
Get your FIPS 140 cryptography cheat sheet here: https://cryptosense.com/datasheets/fips-cheat-sheet?utm_source=youtube&utm_medium=video&utm_campaign=FIPS
Join Dr Graham Steel for this webinar to discuss in detail FIPS-140 Cryptography. We have a tool that will take care of FIPS checking your applications. Get a free demo of Cryptosense Analzyer for FIPS here: https://cryptosense.com/analyzer/demo?utm_source=youtube&utm_medium=description&utm_campaign=FIPS
Maintained by NIST, the Federal Information Processing Standards (FIPS) give guidance to
external suppliers regarding the standards their products have to reach for use by the US
Government.
FIPS have become de facto standards for other sectors and other countries.
FIPS 140 describes the standard for cryptographic modules.
FIPS 14...
published: 18 Jun 2021
-
Protect Your Data & Deployments with FIPS 140-2 & DISA STIG Security & Compliance Standards
For more information about FIPS and DISA STIG, visit https://www.mirantis.com/software/security/
Learn more about the Mirantis ZeroOps approach: https://www.mirantis.com/zeroops/what-is-zeroops/
In this webinar, Mirantis Solution Architect Stephane Montri will talk about:
-What is FIPS? What is DISA STIG?
-How to create a secure & compliant CI/CD workflow
-How Mirantis can help with creating & maintaining a secure CI/CD pipeline
If you are interested in more long-form & informational resources about Mirantis, our solutions & related areas of expertise, please check out our Resource Library: https://www.mirantis.com/resources/
#kubernetes #k8s #cloudsecurity #fips #cloudnative
======================================================
Learn more about Mirantis K8s Engine (MKE): http://www.mi...
published: 14 Oct 2021
-
How to: FIPS - Assessing FIPS 140-2 & FIPS 140-3 Certificates
Follow along as we walk you through assessing FIPS 140-2 & FIPS 140-3 certificates: The Federal Information Processing Standard (FIPS) 140-2 & FIPS 140-3 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140-2 & FIPS 140-3 standards is maintained by the Cryptographic Module Validation Program (CMVP)
published: 18 Apr 2022
5:02
Episode 10: Understanding FIPS 140-2
FIPS 140-2 is a standard developed for the U.S. Government by the National Institute of Standards and Technology (NIST). While it's a common requirement for dat...
FIPS 140-2 is a standard developed for the U.S. Government by the National Institute of Standards and Technology (NIST). While it's a common requirement for data handling in government applications, it's being used in more places, and it's increasingly important to not just be compliant, but to be certified. Product Manager Jay White walks through what FIPS is, how we implement it in our wireless products, and how you can use it to shave anywhere from 4 to 6 months off of your product development timeline.
For more on FIPS 140-2, see our whitepaper:
https://www.lairdconnect.com/fips-140-2-white-paper
https://wn.com/Episode_10_Understanding_Fips_140_2
FIPS 140-2 is a standard developed for the U.S. Government by the National Institute of Standards and Technology (NIST). While it's a common requirement for data handling in government applications, it's being used in more places, and it's increasingly important to not just be compliant, but to be certified. Product Manager Jay White walks through what FIPS is, how we implement it in our wireless products, and how you can use it to shave anywhere from 4 to 6 months off of your product development timeline.
For more on FIPS 140-2, see our whitepaper:
https://www.lairdconnect.com/fips-140-2-white-paper
- published: 03 Mar 2020
- views: 23484
8:17
Understanding FIPS 140-2 & It's Necessity - FIPS Cryptography | Encryption Consulting
Understanding FIPS 140-2 & It's Necessity - FIPS Cryptography | Encryption Consulting
👉SUBSCRIBE
Be sure to subscribe and click that Bell Icon for notification...
Understanding FIPS 140-2 & It's Necessity - FIPS Cryptography | Encryption Consulting
👉SUBSCRIBE
Be sure to subscribe and click that Bell Icon for notifications!
In this video, we are talking about FIPS 140-2 Compliance, their security levels, importance, and who needs to be FIPS compliant.
----------------------------------------------------------------------------------------------------------------------------------------------------------------
To know more about Encryption Consulting LLC, please visit-
https://www.encryptionconsulting.com/
For latest updates, follow us on-
LinkedIn - https://www.linkedin.com/company/encryptionconsulting/
Twitter - https://twitter.com/encryptioncons
Facebook - https://www.facebook.com/encryptionconsulting/
#FIPS #NIST #EncryptionConsulting #Compliance
Video Tags-
fips
fips 140-2
understanding fips 140
fips 140 benefits
NIST
FIPS
how to get fips 140 compliance
cryptography
application security
cryptography inventory
data security compliance
cryptography compliance
devops security
cryptography audit
FIPS cryptography
FIPS 140
FedRAMP compliance
FIPS compliance
FIPS security audit
FIPS keylenths
FIPS block ciphers
FIPS signatures
FIPS MAC
FIPS hash functions
FIPS webinar
learn cryptography
learn FIPS compliance
https://wn.com/Understanding_Fips_140_2_It's_Necessity_Fips_Cryptography_|_Encryption_Consulting
Understanding FIPS 140-2 & It's Necessity - FIPS Cryptography | Encryption Consulting
👉SUBSCRIBE
Be sure to subscribe and click that Bell Icon for notifications!
In this video, we are talking about FIPS 140-2 Compliance, their security levels, importance, and who needs to be FIPS compliant.
----------------------------------------------------------------------------------------------------------------------------------------------------------------
To know more about Encryption Consulting LLC, please visit-
https://www.encryptionconsulting.com/
For latest updates, follow us on-
LinkedIn - https://www.linkedin.com/company/encryptionconsulting/
Twitter - https://twitter.com/encryptioncons
Facebook - https://www.facebook.com/encryptionconsulting/
#FIPS #NIST #EncryptionConsulting #Compliance
Video Tags-
fips
fips 140-2
understanding fips 140
fips 140 benefits
NIST
FIPS
how to get fips 140 compliance
cryptography
application security
cryptography inventory
data security compliance
cryptography compliance
devops security
cryptography audit
FIPS cryptography
FIPS 140
FedRAMP compliance
FIPS compliance
FIPS security audit
FIPS keylenths
FIPS block ciphers
FIPS signatures
FIPS MAC
FIPS hash functions
FIPS webinar
learn cryptography
learn FIPS compliance
- published: 23 Feb 2022
- views: 3524
1:41
FIPS 140-2 Compliance with Digi
FIPS 140-2 validation is required to ensure high levels of security in all cryptographic modules — hardware and software — used by U.S. and Canadian government ...
FIPS 140-2 validation is required to ensure high levels of security in all cryptographic modules — hardware and software — used by U.S. and Canadian government agencies and contractors, as well as police forces, financial institutions, and any organization that must be HIPAA-compliant. However, any operation can comply with the standard to ensure safe handling of data and to prevent cyberattacks.
The great news is that it is easy to comply with the FIPS 140-2 standard with Digi devices by performing a simple firmware update, which is a straightforward change with Digi Remote Manager®. Watch our video to learn more about FIPS and how Digi’s FIPS 140-2 validated devices can support your needs.
Learn more:
• Complete end-to-end solution offerings: https://www.digi.com/products
• Digi Remote Manager: https://www.digi.com/products/iot-software-services/digi-remote-manager
• FIPS 140-2: https://www.digi.com/solutions/by-technology/fips-140
Connect with Digi
Want to learn more about how Digi can help you? Here are some next steps:
• Contact us to talk to a Digi expert - https://www.digi.com/contactus
• Sign up for our newsletter to learn about emerging trends and new solutions - https://www.digi.com/newsletter
• Shop for solutions from Digi and our partners - https://www.digi.com/how-to-buy
https://wn.com/Fips_140_2_Compliance_With_Digi
FIPS 140-2 validation is required to ensure high levels of security in all cryptographic modules — hardware and software — used by U.S. and Canadian government agencies and contractors, as well as police forces, financial institutions, and any organization that must be HIPAA-compliant. However, any operation can comply with the standard to ensure safe handling of data and to prevent cyberattacks.
The great news is that it is easy to comply with the FIPS 140-2 standard with Digi devices by performing a simple firmware update, which is a straightforward change with Digi Remote Manager®. Watch our video to learn more about FIPS and how Digi’s FIPS 140-2 validated devices can support your needs.
Learn more:
• Complete end-to-end solution offerings: https://www.digi.com/products
• Digi Remote Manager: https://www.digi.com/products/iot-software-services/digi-remote-manager
• FIPS 140-2: https://www.digi.com/solutions/by-technology/fips-140
Connect with Digi
Want to learn more about how Digi can help you? Here are some next steps:
• Contact us to talk to a Digi expert - https://www.digi.com/contactus
• Sign up for our newsletter to learn about emerging trends and new solutions - https://www.digi.com/newsletter
• Shop for solutions from Digi and our partners - https://www.digi.com/how-to-buy
- published: 03 Oct 2023
- views: 387
18:01
Achieving FIPS 140-2 Compliance with HashiCorp Vault
In this session, we'll go through the nuances of FIPS 140-2 compliance requirements and walk you through a solution that leverages HashiCorp Vault for secrets m...
In this session, we'll go through the nuances of FIPS 140-2 compliance requirements and walk you through a solution that leverages HashiCorp Vault for secrets management in a FIPS140-2 compliant way.
#HashiCorp #HashiCorpVault #secretsmanagement #zerotrustsecurity
Speaker:
Cameron Huysmans
Regional Manager, Solutions Engineering, HashiCorp
If you liked this video and want to see more from HashiCorp, subscribe to our channel: https://www.youtube.com/c/HashiCorp?sub_confirmation=1
To learn more, visit our hands-on interactive lab environment, HashiCorp Learn: https://learn.hashicorp.com/
HashiCorp is the leader in multi-cloud infrastructure automation software. The HashiCorp software suite enables organizations to adopt consistent workflows to provision, secure, connect, and run any infrastructure for any application. HashiCorp open source tools Vagrant, Packer, Terraform, Vault, Consul, Nomad, Boundary, and Waypoint are downloaded tens of millions of times each year and are broadly adopted by the Global 2000. Enterprise versions of these products enhance the open source tools with features that promote collaboration, operations, governance, and multi-data center functionality.
For more information, visit: www.hashicorp.com or follow us on social media:
Twitter: @hashicorp
LinkedIn: https://www.linkedin.com/company/hashicorp
Facebook: https://www.facebook.com/HashiCorp
https://wn.com/Achieving_Fips_140_2_Compliance_With_Hashicorp_Vault
In this session, we'll go through the nuances of FIPS 140-2 compliance requirements and walk you through a solution that leverages HashiCorp Vault for secrets management in a FIPS140-2 compliant way.
#HashiCorp #HashiCorpVault #secretsmanagement #zerotrustsecurity
Speaker:
Cameron Huysmans
Regional Manager, Solutions Engineering, HashiCorp
If you liked this video and want to see more from HashiCorp, subscribe to our channel: https://www.youtube.com/c/HashiCorp?sub_confirmation=1
To learn more, visit our hands-on interactive lab environment, HashiCorp Learn: https://learn.hashicorp.com/
HashiCorp is the leader in multi-cloud infrastructure automation software. The HashiCorp software suite enables organizations to adopt consistent workflows to provision, secure, connect, and run any infrastructure for any application. HashiCorp open source tools Vagrant, Packer, Terraform, Vault, Consul, Nomad, Boundary, and Waypoint are downloaded tens of millions of times each year and are broadly adopted by the Global 2000. Enterprise versions of these products enhance the open source tools with features that promote collaboration, operations, governance, and multi-data center functionality.
For more information, visit: www.hashicorp.com or follow us on social media:
Twitter: @hashicorp
LinkedIn: https://www.linkedin.com/company/hashicorp
Facebook: https://www.facebook.com/HashiCorp
- published: 26 May 2021
- views: 1786
1:13
World's fastest FIPS 140-2
World's fastest FIPS 140-2 Level 3 certified Hardware Security Module with PCI Express Gen 2.0 - Industry’s Fastest and Most Cloud Ready HSM Family for Cloud Da...
World's fastest FIPS 140-2 Level 3 certified Hardware Security Module with PCI Express Gen 2.0 - Industry’s Fastest and Most Cloud Ready HSM Family for Cloud Data Centers, Enterprise, Government & Ecommerce Applications
LiquidSecurity™ HSM family is a FIPS 140-2 level 2 and level 3 certified solution that provides elastic and centralized key management and key operation functionality. With 32 partitioned HSMs in a single physical HSM, 50,000 key store independent of key size, 35,000 2048b RSA ops/sec and chaining of up to 20 Appliances, LiquidSecurity CNL35xx family provides a solution that addresses requirements from few hundred RSA ops/sec or few key stores to 700K RSA ops/sec or 1M key store and everything in-between. This product family, available as a PCI Express adapter with complete software or a network HSM appliance, offers a no compromise cost efficient solution that addresses the stringent security requirements of SaaS applications, ecommerce payment systems and Enterprise, Banking and Government security applications especially as they migrate to the Public or Private cloud. Major applications for this product family include Key Management as-a-Service, Database as-a-Service, Crypto as-a-service, Secure DNS, SaaS Applications and Virtual Private Clouds in the Public Cloud. To know more visit @ http://www.cavium.com/LiquidSecurity-HSM.html
https://wn.com/World's_Fastest_Fips_140_2
World's fastest FIPS 140-2 Level 3 certified Hardware Security Module with PCI Express Gen 2.0 - Industry’s Fastest and Most Cloud Ready HSM Family for Cloud Data Centers, Enterprise, Government & Ecommerce Applications
LiquidSecurity™ HSM family is a FIPS 140-2 level 2 and level 3 certified solution that provides elastic and centralized key management and key operation functionality. With 32 partitioned HSMs in a single physical HSM, 50,000 key store independent of key size, 35,000 2048b RSA ops/sec and chaining of up to 20 Appliances, LiquidSecurity CNL35xx family provides a solution that addresses requirements from few hundred RSA ops/sec or few key stores to 700K RSA ops/sec or 1M key store and everything in-between. This product family, available as a PCI Express adapter with complete software or a network HSM appliance, offers a no compromise cost efficient solution that addresses the stringent security requirements of SaaS applications, ecommerce payment systems and Enterprise, Banking and Government security applications especially as they migrate to the Public or Private cloud. Major applications for this product family include Key Management as-a-Service, Database as-a-Service, Crypto as-a-service, Secure DNS, SaaS Applications and Virtual Private Clouds in the Public Cloud. To know more visit @ http://www.cavium.com/LiquidSecurity-HSM.html
- published: 26 Aug 2010
- views: 1825
6:27
FIPS 140-2 Compliant GitLab Runner Speed Run
Overview of the FIPS 140-2 Compliant GitLab Runner released in GitLab Runner 14.7
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27886
https://gitlab.co...
Overview of the FIPS 140-2 Compliant GitLab Runner released in GitLab Runner 14.7
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27886
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28814
https://docs.gitlab.com/runner/install/
https://wn.com/Fips_140_2_Compliant_Gitlab_Runner_Speed_Run
Overview of the FIPS 140-2 Compliant GitLab Runner released in GitLab Runner 14.7
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/27886
https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28814
https://docs.gitlab.com/runner/install/
- published: 17 Jan 2022
- views: 178
33:10
WEBINAR RECORDING: What is FIPS Cryptography? How to get FIPS 140 Compliance?
Get your FIPS 140 cryptography cheat sheet here: https://cryptosense.com/datasheets/fips-cheat-sheet?utm_source=youtube&utm_medium=video&utm_campaign=FIPS
Join...
Get your FIPS 140 cryptography cheat sheet here: https://cryptosense.com/datasheets/fips-cheat-sheet?utm_source=youtube&utm_medium=video&utm_campaign=FIPS
Join Dr Graham Steel for this webinar to discuss in detail FIPS-140 Cryptography. We have a tool that will take care of FIPS checking your applications. Get a free demo of Cryptosense Analzyer for FIPS here: https://cryptosense.com/analyzer/demo?utm_source=youtube&utm_medium=description&utm_campaign=FIPS
Maintained by NIST, the Federal Information Processing Standards (FIPS) give guidance to
external suppliers regarding the standards their products have to reach for use by the US
Government.
FIPS have become de facto standards for other sectors and other countries.
FIPS 140 describes the standard for cryptographic modules.
FIPS 140 is designed to be used by the module validation programme (CMVP).
The list of validated modules is public at https://csrc.nist.gov/projects/cryptographic-modulevalidation-
program/validated-modules.
Showing an application is compliant comes down to proving it uses a validated module for
all in-scope cryptography.
This webinar covers:
- FIPS Keylengths
- FIPS Elliptic Curves
- FIPS Finite Field Cryptography Parameters
- FIPS Block Ciphers
- FIPS Block Cipher Modes
- FIPS Signature Functions
- FIPS Asymmetric Encryption
- FIPS Hash functions
- FIPS MACs
Background References:
- FIPS 140-2 Appendix A
https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402annexa.pdf
- FIPS 140-3 Annex C
https://csrc.nist.gov/publications/detail/sp/800-140c/final
Note that these give identical requirements as of June 2021.
/////
Find out more about Cryptosense: https://cryptosense.com/
Follow us on Twitter: https://twitter.com/cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
https://wn.com/Webinar_Recording_What_Is_Fips_Cryptography_How_To_Get_Fips_140_Compliance
Get your FIPS 140 cryptography cheat sheet here: https://cryptosense.com/datasheets/fips-cheat-sheet?utm_source=youtube&utm_medium=video&utm_campaign=FIPS
Join Dr Graham Steel for this webinar to discuss in detail FIPS-140 Cryptography. We have a tool that will take care of FIPS checking your applications. Get a free demo of Cryptosense Analzyer for FIPS here: https://cryptosense.com/analyzer/demo?utm_source=youtube&utm_medium=description&utm_campaign=FIPS
Maintained by NIST, the Federal Information Processing Standards (FIPS) give guidance to
external suppliers regarding the standards their products have to reach for use by the US
Government.
FIPS have become de facto standards for other sectors and other countries.
FIPS 140 describes the standard for cryptographic modules.
FIPS 140 is designed to be used by the module validation programme (CMVP).
The list of validated modules is public at https://csrc.nist.gov/projects/cryptographic-modulevalidation-
program/validated-modules.
Showing an application is compliant comes down to proving it uses a validated module for
all in-scope cryptography.
This webinar covers:
- FIPS Keylengths
- FIPS Elliptic Curves
- FIPS Finite Field Cryptography Parameters
- FIPS Block Ciphers
- FIPS Block Cipher Modes
- FIPS Signature Functions
- FIPS Asymmetric Encryption
- FIPS Hash functions
- FIPS MACs
Background References:
- FIPS 140-2 Appendix A
https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402annexa.pdf
- FIPS 140-3 Annex C
https://csrc.nist.gov/publications/detail/sp/800-140c/final
Note that these give identical requirements as of June 2021.
/////
Find out more about Cryptosense: https://cryptosense.com/
Follow us on Twitter: https://twitter.com/cryptosense
/////
Cryptosense CEO Dr. Graham Steel was formerly an academic researcher before founding Cryptosense in 2013. His cryptography expertise is the basis for the company's 'Analyzer' technology which allows customers to protect themselves against losing sensitive data.
- published: 18 Jun 2021
- views: 10651
24:55
Protect Your Data & Deployments with FIPS 140-2 & DISA STIG Security & Compliance Standards
For more information about FIPS and DISA STIG, visit https://www.mirantis.com/software/security/
Learn more about the Mirantis ZeroOps approach: https://www.mir...
For more information about FIPS and DISA STIG, visit https://www.mirantis.com/software/security/
Learn more about the Mirantis ZeroOps approach: https://www.mirantis.com/zeroops/what-is-zeroops/
In this webinar, Mirantis Solution Architect Stephane Montri will talk about:
-What is FIPS? What is DISA STIG?
-How to create a secure & compliant CI/CD workflow
-How Mirantis can help with creating & maintaining a secure CI/CD pipeline
If you are interested in more long-form & informational resources about Mirantis, our solutions & related areas of expertise, please check out our Resource Library: https://www.mirantis.com/resources/
#kubernetes #k8s #cloudsecurity #fips #cloudnative
======================================================
Learn more about Mirantis K8s Engine (MKE): http://www.mirantis.com/mke
Learn more about Mirantis Secure Registry (MSR): http://www.mirantis.com/msr
Enterprise Kubernetes Security Checklist: https://www.mirantis.com/resources/kubernetes-enterprise-security-checklist/
======================================================
Learn more about Mirantis: https://www.mirantis.com/
Questions? Speak with a cloud native expert today: https://www.mirantis.com/contact/
World class training from Mirantis: https://training.mirantis.com/
Mirantis Labs - Dev-centric discussions & tutorials: https://www.mirantis.com/labs/
Connect with us on LinkedIn: https://www.linkedin.com/company/mirantis
Follow us on Twitter: https://twitter.com/MirantisIT
Download Lens free today: https://k8slens.dev
======================================================
CHAPTERS
0:00 Introduction
1:40 Mirantis simplifies & modernizes cloud native infrastructure
4:46 Overview of the entire Mirantis Container Platform
7:27 Mirantis' Devops-as-a-Service Platform: Lens Autopilot
8:17 Ship Code Faster: Secure Software Supply Chain & Development Lifecycle
9:40 Applying Security Controls
11:50 What even is FIPS 140-2?
14:07 What does FIPS 140-2 mean to the Mirantis Team?
19:47 What about Mirantis and DISA-STIG
22:54 Sample Kubernetes STIG Checklist
https://wn.com/Protect_Your_Data_Deployments_With_Fips_140_2_Disa_Stig_Security_Compliance_Standards
For more information about FIPS and DISA STIG, visit https://www.mirantis.com/software/security/
Learn more about the Mirantis ZeroOps approach: https://www.mirantis.com/zeroops/what-is-zeroops/
In this webinar, Mirantis Solution Architect Stephane Montri will talk about:
-What is FIPS? What is DISA STIG?
-How to create a secure & compliant CI/CD workflow
-How Mirantis can help with creating & maintaining a secure CI/CD pipeline
If you are interested in more long-form & informational resources about Mirantis, our solutions & related areas of expertise, please check out our Resource Library: https://www.mirantis.com/resources/
#kubernetes #k8s #cloudsecurity #fips #cloudnative
======================================================
Learn more about Mirantis K8s Engine (MKE): http://www.mirantis.com/mke
Learn more about Mirantis Secure Registry (MSR): http://www.mirantis.com/msr
Enterprise Kubernetes Security Checklist: https://www.mirantis.com/resources/kubernetes-enterprise-security-checklist/
======================================================
Learn more about Mirantis: https://www.mirantis.com/
Questions? Speak with a cloud native expert today: https://www.mirantis.com/contact/
World class training from Mirantis: https://training.mirantis.com/
Mirantis Labs - Dev-centric discussions & tutorials: https://www.mirantis.com/labs/
Connect with us on LinkedIn: https://www.linkedin.com/company/mirantis
Follow us on Twitter: https://twitter.com/MirantisIT
Download Lens free today: https://k8slens.dev
======================================================
CHAPTERS
0:00 Introduction
1:40 Mirantis simplifies & modernizes cloud native infrastructure
4:46 Overview of the entire Mirantis Container Platform
7:27 Mirantis' Devops-as-a-Service Platform: Lens Autopilot
8:17 Ship Code Faster: Secure Software Supply Chain & Development Lifecycle
9:40 Applying Security Controls
11:50 What even is FIPS 140-2?
14:07 What does FIPS 140-2 mean to the Mirantis Team?
19:47 What about Mirantis and DISA-STIG
22:54 Sample Kubernetes STIG Checklist
- published: 14 Oct 2021
- views: 245
3:58
How to: FIPS - Assessing FIPS 140-2 & FIPS 140-3 Certificates
Follow along as we walk you through assessing FIPS 140-2 & FIPS 140-3 certificates: The Federal Information Processing Standard (FIPS) 140-2 & FIPS 140-3 is a U...
Follow along as we walk you through assessing FIPS 140-2 & FIPS 140-3 certificates: The Federal Information Processing Standard (FIPS) 140-2 & FIPS 140-3 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140-2 & FIPS 140-3 standards is maintained by the Cryptographic Module Validation Program (CMVP)
https://wn.com/How_To_Fips_Assessing_Fips_140_2_Fips_140_3_Certificates
Follow along as we walk you through assessing FIPS 140-2 & FIPS 140-3 certificates: The Federal Information Processing Standard (FIPS) 140-2 & FIPS 140-3 is a U.S. government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140-2 & FIPS 140-3 standards is maintained by the Cryptographic Module Validation Program (CMVP)
- published: 18 Apr 2022
- views: 2142