FIPS 140-2 is a US federal standard that dictates the security requirements for cryptographic modules utilized within a security system protecting sensitive information in computer systems.
CA RCM makes limited use of encryption, primarily to protect passwords and other information used to access other applications, databases, or operating environments.
To enable FIPS 140-2 compliant encryption in CA RCM, do the following:
Important! If FIPS-compliant encryption is adopted after CA RCM begins to function, inconsistencies can result. Previously encrypted data can be rendered inaccessible, and passwords must be redefined. Select algorithms and a key storage method, and implement FIPS-compliant encryption immediately after installation, before you begin to work with CA RCM.
| Copyright © 2010 CA. All rights reserved. | Email CA Technologies about this topic |