Security standards configurations (compliance types)

We can configure IBM Security Verify Access Base components to work with various security standards, including FIPS 140-2, SP 800-131, and Suite B. These security standards meet information security requirements required by the government. ISAM uses cryptography in the following areas:

The Security Verify Access Base components integrate cryptographic modules, which include IBM Global Security Kit (GSKit) 8, Java™ Secure Socket Extension (JSSE), and Java Cryptography Extension (JCE). Most of the requirements in the standards are handled in GSKit, JSSE, and JCE, which must undergo the certification process to meet government standards. Security Verify Access Base components must be configured to run with GSKit, JSSE, and JCE that are enabled for a particular standard.

Parent topic: Core technologies