{"id":4110,"date":"2024-09-20T20:23:26","date_gmt":"2024-09-20T18:23:26","guid":{"rendered":"https:\/\/webdev.atsec.us\/?p=4110"},"modified":"2024-09-20T20:31:45","modified_gmt":"2024-09-20T18:31:45","slug":"the-nccoes-automation-of-cmvp","status":"publish","type":"post","link":"https:\/\/webdev.atsec.us\/the-nccoes-automation-of-cmvp\/","title":{"rendered":"The NCCoE\u2019s Automation of the CMVP"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

Earlier today at the ICMC24, we heard from a panel about the US National Cybersecurity Center of Excellence<\/a>\u2019s (NCCoE) work on the Automated Cryptographic Module Validation Program (ACMVP), which intends to tackle the troublingly long queue times we\u2019ve seen for a while. Currently, the temporary solution has been to issue interim certificates for modules that would need to wait in queue for months, possibly years. These interim certifications are only valid for two years with reduced assurance resulting from the decreased rigor in reviewing the submitted modules, however, which doesn\u2019t fully accomplish the goals of requiring certification. The ACMVP aims to improve the efficiency of the validation process via automation to address the growing queue length while still maintaining a high level of rigor, assurance, and the five years of certificate validity.<\/p>\n\n\n\n

For the project, NCCoE pulled together experts from CMVP, testing laboratories, and vendors to tackle areas of the CMVP FIPS 140-3 validation process where automation can enhance efficiency, with a special focus on the test report. The ICMC panel discussions by the NCCoE\u2019s ACMVP cover the completed work and future plans of all three workstreams (Test Evidence (TE), Protocol, and Research Infrastructure) and demonstrated the AMVP (Automated Module Validation Protocol) server\u2019s capability of generating a Security Policy (SP). atsec co-leads the TE Workstream with the CMVP and we want to take this opportunity to elaborate on the three major accomplishments that have been completed by this workstream.<\/p>\n\n\n\n

1. Classifying TEs<\/strong><\/p>\n\n\n\n

The TE Workstream classified test evidence into the following categories, depending on what needs to be checked, inspected, or tested, and how the vendor evidence (VE) is supposed to be provided:<\/p>\n\n\n\n