7.7 Crypto modules have been validated against FIPS 140-2 or equivalentΒΆ
Verify that cryptographic algorithms used by the application have been validated against FIPS 140-2 or an equivalent standard.
Levels: 1, 2, 3
Verify that cryptographic algorithms used by the application have been validated against FIPS 140-2 or an equivalent standard.
Levels: 1, 2, 3