{"id":3657,"date":"2019-03-04T18:51:00","date_gmt":"2019-03-04T17:51:00","guid":{"rendered":"https:\/\/webdev.atsec.us\/?p=3657"},"modified":"2024-07-26T19:01:42","modified_gmt":"2024-07-26T17:01:42","slug":"cryptographic-module-related-work-in-iso-iec-jtc-1-sc-27-wg-3","status":"publish","type":"post","link":"https:\/\/webdev.atsec.us\/cryptographic-module-related-work-in-iso-iec-jtc-1-sc-27-wg-3\/","title":{"rendered":"Cryptographic module related work in ISO\/IEC JTC 1\/SC 27\/WG 3"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

For several years the value of conformance testing against the FIPS 140-2 specification has been well accepted, and the assurance gained through validated conformance has been specified (with varying degrees of rigor) in several other markets. For example:<\/p>\n\n\n\n