![]() Title: Apple FileVault 2 with macOS 13 Ventura Protection Profiles: PP_OS_V4.3 (To be confirmed) Title: Apple Corecrypto Kernel Module v8.0 for Intel Operating system: macOS 10.13 High Sierra Title: Apple Corecrypto User Module v8.0 for Intel Title: Apple Corecrypto Kernel Module v9.0 for Intel Title: Apple Corecrypto User Module v9.0 for Intel Title: Apple Corecrypto Kernel Module v10.0 for Intel (ccv10) ![]() Title: Apple Corecrypto User Space Module for Intel (ccv10) Operating system: sepOS distributed with macOS 11 Big Sur on Apple silicon Operating system: sepOS distributed with macOS 11 Big Sur on Apple silicon, sepOS distributed with macOS 11 Big Sur on Intel ![]() Operating system: macOS 11 Big Sur on Apple silicon ![]() Operating system: macOS 11 Big Sur on Intel Operating system: sepOS distributed with macOS 12 Monterey on Intel with T2Įnvironment: Intel, Secure Key Store, Hardware Operating system: macOS 12 Monterey on Intel Operating system: sepOS distributed with macOS 12 Monterey on Apple silicon Operating system: macOS 12 Monterey on Apple siliconĮnvironment: Apple silicon, User, SoftwareĮnvironment: Apple silicon, Kernel, Software Operating system: sepOS distributed with macOS 13 Ventura ARM T2Įnvironment: T2, Secure Key Store, Hardware Operating system: macOS 13 Ventura on Intel Type: Hardware (M1, M1 Pro, M1 Max, M1 Ultra, M2) Operating system: sepOS distributed with macOS 13 Ventura on Apple siliconĮnvironment: Apple silicon, Secure Key Store, Hardware Operating system: macOS 13 Ventura on Apple siliconĮnvironment: Apple silicon/ARM, User, SoftwareĮnvironment: Apple silicon/ARM, Kernel, Software The table below shows the 2020–2022 cryptographic modules that are currently being tested by the laboratory for conformance with FIPS 140-3. They are listed on the Modules in Process List. MacOS 11 Big Sur user space, kernel space, and secure key store have completed laboratory testing and have been recommended by the laboratory to the CMVP for validation. They are listed on the Implementation Under Test List and, when testing is complete, on the Modules in Process List. MacOS 12 Monterey user space, kernel space, and secure key store are undergoing laboratory testing. MacOS 13 Ventura user space, kernel space, and secure key store are undergoing laboratory testing. For more information, see the apple_ssh_and_fips man page in macOS 12.0.1 or later. Administrators can also create their own files. MacOS then uses these files to limit the ciphers available to OpenSSH to only those which have been validated by NIST and ensures that the OpenSSH client uses the platform-provided, validated cryptographic module. The installer places two files on the Mac:įips_ssh_config: Placed in /private/etc/ssh/ssh_config.d/įips_sshd_config: Placed in /private/etc/ssh/sshd_config.d/ OpenSSH can be configured to use FIPS 140-3 validated modules for select FIPS 140-3 algorithms.Organizations can run a signed and notarized installer that is available from Apple with the password FIPS140Mode. For information about T2 chip certifications see Apple T2 Security Chip security certifications. Note: Apple T2 Security chips are included in many Intel-based Mac computers.
0 Comments
Leave a Reply. |