Skip to content

Commit 3cc39a0

Browse files
committed
README: add validation boundary note and authoritative FIPS references
1 parent f6d91d4 commit 3cc39a0

1 file changed

Lines changed: 21 additions & 0 deletions

File tree

README.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,10 @@ In short:
6969
- **Product claim:** fail closed if that surface cannot be established.
7070
- **Non-claim:** no claim that this application is itself CMVP-validated.
7171

72+
Validation boundary note:
73+
- fips-pad is an application that depends on OS crypto surfaces.
74+
- Any CMVP validation status applies to the underlying cryptographic module entries, not to this application as a validated module.
75+
7276
### Windows 10 / 11
7377

7478
- Crypto backend: Windows CNG / BCrypt
@@ -192,6 +196,23 @@ This is control tailoring, exactly as 800-53 intends.
192196

193197
---
194198

199+
## Authoritative references
200+
201+
- FIPS 140-3 (NIST publication):
202+
https://csrc.nist.gov/pubs/fips/140-3/final
203+
- NIST CMVP program overview and validation listings:
204+
https://csrc.nist.gov/projects/cryptographic-module-validation-program
205+
- NIST SP 800-53 Rev. 5 control catalog:
206+
https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
207+
- Windows FIPS mode API (`BCryptGetFipsAlgorithmMode`):
208+
https://learn.microsoft.com/windows/win32/api/bcrypt/nf-bcrypt-bcryptgetfipsalgorithmmode
209+
- Ubuntu FIPS enablement guidance:
210+
https://ubuntu.com/security/certifications/docs/16-18/fips-enablement
211+
- RHEL FIPS mode guidance:
212+
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/security_hardening/switching-rhel-to-fips-mode_security-hardening
213+
214+
---
215+
195216
## What it means if the app starts
196217

197218
If fips-pad starts:

0 commit comments

Comments
 (0)