The Venafi Trust Protection Platform received Common Criteria Certification, a requirement for hardware and software devices used by the federal government and national security systems for the most classified government and military networks in the nation.Learn how we do it
Malicious insiders and nation-state hackers can forge machine identities, allowing them to hide in encrypted traffic and evade other security controls. To protect machine identities from attack, federal agencies must maintain active control of all the keys and certificates that serve as machine identities in order to authenticate machine-to-machine communication and connections.Learn More
Protecting machine identities is a vital part of managing network access controls to secure your critical infrastructure. Keys and certificates are used to uniquely identify and create trusted connections between machines, devices and systems. They govern the flow of information to trusted machines and prevent the flow of information to those that are not trusted. So it’s important that you maintain tight control over all of them.Learn More
OMB M-15-13 (HTTPS-Only standard) mandates that federal agencies encrypt communications across the federal government. Encrypted communications rely on digital certificates and cryptographic keys to verify the identities of machine-to-machine communications, in much the same way that federal employees identify themselves with CAC and PIV cards.
The Continuous Diagnostics and Mitigation (CDM) program also outlines specific requirements for the use and management of encryption in BOUND E guidelines. As you extend encryption deeper into your agency, you’ll need the ability to monitor and protect the keys and certificates that govern the identity of your agency’s machines and safeguard the data they transmit.
Having earned certification from the National Information Assurance Partnership (NIAP)-approved Common Criteria Testing Laboratory (CCTL), the Venafi Trust Protection Platform helps federal agencies manage and secure the cryptographic keys and digital certificates that make up machine identities. Using the Venafi Platform, agencies can efficiently orchestrate the entire machine identity life cycle, keeping communications between machines secure and private. Built to withstand the rigors of even the most classified “high-side” networks, the Venafi Platform will help you comply with mandates that pertain to protecting machine identities.Learn about our products
The Venafi Trust Protection Platform integrates with FIPS validated hardware to maximize the security of the assets it manages. The platform runs on Microsoft Windows Server 2012 R2 in FIPS mode, and TPP uses Microsoft FIPS-certified libraries for cryptography operations. The Venafi Platform also integrates with one or more FIPS 140-2 Level 2 configured HSMs to store and secure symmetric keys used for encrypting private keys and other sensitive information in the platform’s database.Learn More
In addition to mandating protection for encryption within its own agencies, the federal government also requires similar protection for federal contractors. NIST 800-171 is designed to protect Controlled Unclassified Information (CUI)—whether at rest or in transit—in nonfederal organizations. Learn more about how Venafi helps nonfederal organizations ensure secure authentication, access control and confidentiality of communications.Learn More