The Federal Information Processing Standard (FIPS) 140-2 is a set of standards that govern the use of cryptographic technology, and FIPS compliance is required by all U.S. government agencies and the contractors and vendors who work with them. The FIPS 140-2 regulations stipulate that hardware or software cryptographic modules must use algorithms from an approved list when protecting data at rest and in motion.
The download page offers FIPS 140-2 compliant installers for Microsoft Windows and Linux operating system. These installers use NIST approved cyptography modules to ensure only approved SSL cyphers are allowed during SSL handshake.
FIPS-enabled computers can only connect to servers with FIPS-compliant ciphers for SSL/TLS (Secure Sockets Layer/Transport Layer Security). For an email server to be compliant, it must use at least one cipher SSL/TLS mechanism for signing, hashing, and encryption.
Using configurable parameters, you can not only change the version of TLS used in Xeams but can also specify ciphers used during SSL communication.
In additional to the in-transit and hardware level security, Xeams also offers End-To-End encrypted emails, which ensures only the intended recipient can view sensitive emails.
Xeams offers two methods for end-to-end encryption:
The FIPS compliant installers for Xeams use the following module:
Module Name: | Bouncy Castle FIPS module. |
---|---|
Certification Number: | 3514 |
Certificate Date: | 8th February 2022 |