The AWS console went dark. Your encryption keys were safe, but only because every packet in and out obeyed FIPS 140-3.
FIPS 140-3 is not an optional checkbox if you care about compliance, regulated workloads, or zero-trust security. AWS gives you the tools to enforce it at the network, service, and library level—if you know where to look and how to flip the right switches.
What is AWS FIPS 140-3 Access
FIPS 140-3 is the U.S. government standard for cryptographic modules. It defines how encryption is built, validated, and applied. Many industries enforce it for legal reasons. For AWS, it means using endpoints and infrastructure that have been tested and certified. When you connect to a FIPS-enabled service endpoint, every cryptographic operation follows that strict standard.
How AWS Makes It Work
AWS provides FIPS 140-3 validated endpoints for major services like S3, EC2, Lambda, KMS, and more. You can direct your API calls to these FIPS-specific URLs instead of the default ones. AWS CLI and SDKs can be configured to point to them by default. For example, using the --endpoint-url flag or environment variables ensures your traffic is encrypted with a validated cryptographic module.
AWS Key Management Service (KMS) runs on FIPS-validated HSMs. CloudHSM can be configured for higher assurance environments. Glue, API Gateway, and Secrets Manager all have FIPS endpoints in supported regions. This applies across regions, but you need to check the AWS documentation for which services support FIPS 140-3 in your target region.