You need FIPS 140-3 compliance, and you need it now.
FIPS 140-3 is the latest U.S. government cryptographic standard. It sets the rules for how cryptographic modules must be designed, implemented, and validated. Many regulated industries and government contracts require it. If your application handles sensitive data—finance, healthcare, defense—FIPS 140-3 can be the difference between a passed audit and a failed one.
OpenSSL is the most common cryptographic library in use today. It powers TLS, SSL, and core crypto functions for countless systems. But running OpenSSL in a FIPS-approved mode is not a default setting—you have to configure it, build it, and in many cases, validate it. With FIPS 140-3 replacing FIPS 140-2, updates to your cryptographic modules matter. Legacy builds will not automatically meet new requirements.
The OpenSSL team provides a FIPS 140-3 validated module for compatible versions. This module is separate from the main OpenSSL distribution. You must download, compile, and integrate it correctly. The typical setup involves:
- Installing the FIPS Object Module approved under FIPS 140-3.
- Linking it with a compatible OpenSSL version.
- Configuring the runtime to load and enforce the FIPS provider.
To check that FIPS mode is active, you can run commands like: