{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifs4idnpqwddstfyl5hqtdbvil5cihwnga4b5s3mrqq2bixpthrxy",
"uri": "at://did:plc:uxkrhzvf6obbsoh5nf2gkpj5/app.bsky.feed.post/3mlt57kfp2hy2"
},
"path": "/how-to-leverage-fips-to-meet-common-criteria-requirements/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-leverage-fips-to-meet-common-criteria-requirements",
"publishedAt": "2026-05-14T12:00:04.000Z",
"site": "https://www.wolfssl.com",
"tags": [
"wolfCrypt FIPS",
"Uncategorized"
],
"textContent": "Does your project require meeting Common Criteria standards? Using wolfSSL’s FIPS-validated module (or FIPS-ready which is tailored towards FIPS requirements) helps a lot with meeting CC (Common Criteria) because it gives strong, reusable evidence for the crypto portion through independent validation of crypto algorithms and validation evidence with ACVP workflows. Having the ACVP tests and […]",
"title": "How to Leverage FIPS to Meet Common Criteria Requirements"
}