Are there any FIPS-140-2 certified solutions for Linux?
- by Mark Renouf
I'm not even 100% certain what this involves, but my current understanding is this:
use of only approved cryptographic algorithms for network traffic (easy, we use SSL and lock down the algorithms to only the really strong ones).
Some form of physical data protection, involving disk encryption and physical tamper evident packaging.
Obviously…