NITROXIII CNN35XX-NFBE HSM Family

Certificate #4700

Webpage information ?

Status active
Validation dates 30.05.2024
Sunset date 29-05-2029
Standard FIPS 140-3
Security level 3
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. The module generates SSPs whose strengths are modified by available entropy
Exceptions
  • Operational environment: N/A
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
  • Documentation requirements: N/A
  • Cryptographic module security policy: N/A
Description The NITROXIII CNN35XX-NFBE HSM Family module by Marvell (formerly Cavium Inc.) is a high-performance purpose-built security solution for crypto acceleration. The module provides a FIPS 140-3 overall Level 3 security solution. The module is deployed in a PCIe slot to provide crypto and TLS 1.0/1.1/1.2 acceleration in a secure manner to the system host. It is typically deployed in a server or an appliance to provide crypto offload. The module’s functions are accessed over the PCIe interface via an API defined by the module.
Version (Hardware) HW-1.0 (CNL3510-NFBE-G; CNL3510P-NFBE-G; CNL3530-NFBE-G; CNL3560-NFBE-G; CNL3560P-NFBE-G; CNN3510-NFBE-G; CNN3530-NFBE-G; CNN3560-NFBE-G; CNN3560P-NFBE-G); HW-2.0 (CNL3510-NFBE-2.0-G; CNL3510B-NFBE-2.0-G; CNL3510P-NFBE-2.0-G; CNL3510PB-NFBE-2.0-G; CNL3530-NFBE-2.0-G; CNL3530B-NFBE-2.0-G; CNL3560-NFBE-2.0-G; CNL3560B-NFBE-2.0-G; CNL3560P-NFBE-2.0-G; CNL3560PB-NFBE-2.0-G; CNN3505LP-NFBE-2.0-G; CNN3510-NFBE-2.0-G; CNN3510LP-NFBE-2.0-G; CNN3510LPB-NFBE-2.0-G; CNN3530-NFBE-2.0-G; CNN3560-NFBE-2.0-G; CNN3560P-NFBE-2.0-G); HW-3.0 (CNL3510-NFBE-3.0-G; CNL3510A-NFBE-3.0-G; CNL3510C-NFBE-3.0-G; CNL3510D-NFBE-3.0-G; CNL3510E-NFBE-3.0-G; CNL3510F-NFBE-3.0-G; CNL3510I-NFBE-3.0-G; CNL3510P-NFBE-3.0-G; CNL3530-NFBE-3.0-G; CNL3530A-NFBE-3.0-G; CNL3530B-NFBE-3.0-G; CNL3530C-NFBE-3.0-G; CNL3530D-NFBE-3.0-G; CNL3530E-NFBE-3.0-G; CNL3530F-NFBE-3.0-G; CNL3560-NFBE-3.0-G; CNL3560A-NFBE-3.0-G; CNL3560B-NFBE-3.0-G; CNL3560B-NFBE-3.0-G-FB; CNL3560C-NFBE-3.0-G; CNL3560D-NFBE-3.0-G; CNL3560E-NFBE-3.0-G; CNL3560F-NFBE-3.0-G; CNL3560P-NFBE-3.0-G; CNN3505LP-NFBE-3.0-G; CNN3505LPA-NFBE-3.0-G; CNN3505LPC-NFBE-3.0-G; CNN3505LPD-NFBE-3.0-G; CNN3505LPE-NFBE-3.0-G; CNN3505LPF-NFBE-3.0-G; CNN3510-NFBE-3.0-G; CNN3510A-NFBE-3.0-G; CNN3510C-NFBE-3.0-G; CNN3510D-NFBE-3.0-G; CNN3510E-NFBE-3.0-G; CNN3510F-NFBE-3.0-G; CNN3510LP-NFBE-3.0-G; CNN3510LPA-NFBE-3.0-G; CNN3510LPB-NFBE-3.0-G; CNN3510LPC-NFBE-3.0-G; CNN3510LPD-NFBE-3.0-G; CNN3510LPE-NFBE-3.0-G; CNN3510LPF-NFBE-3.0-G; CNN3530-NFBE-3.0-G; CNN3530A-NFBE-3.0-G; CNN3530C-NFBE-3.0-G; CNN3530D-NFBE-3.0-G; CNN3530E-NFBE-3.0-G; CNN3530F-NFBE-3.0-G; CNN3560-NFBE-3.0-G; CNN3560A-NFBE-3.0-G; CNN3560C-NFBE-3.0-G; CNN3560D-NFBE-3.0-G; CNN3560E-NFBE-3.0-G; CNN3560F-NFBE-3.0-G; CNN3560P-NFBE-3.0-G)
Version (Firmware) CNN35XX-NFBE-FW-2.09-0702, CNN35XX-NFBE-SMW-2.09-0702, CNN35XX-UBOOT-4.03-03
Vendor Marvell Semiconductor, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES192, AES-, AES-256, CAST, DES, TDES, Triple-DES, HMAC, CMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA1, SHA256, SHA-256, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHA3, MD5, PBKDF
Schemes
MAC, Key agreement, Key Agreement
Protocols
SSH, SSL, TLS, TLS v1.2, TLS 1.2, TLSv1.0
Randomness
DRBG, RBG
Libraries
OpenSSL
Elliptic Curves
P-521, P-224, P-256, P-384, P-192, K-233, K-283, K-409, K-571, B-233, B-409, B-571, B-283, B-163, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP160r1, FRP256v1, Curve25519
Block cipher modes
ECB, CBC, CTR, GCM
TLS cipher suites
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Trusted Execution Environments
PSP, SSC

Security level
Level 3, Level 1
Side-channel analysis
physical tampering
Certification process
out of scope, HSM. The LiquidSecurity Appliance is outside the module’s cryptographic boundary and therefore out of scope of this validation. CNN35XX-NFBE-G Firmware: CNN35XX-NFBE-FW-2.09-0702 CNN35XX-NFBE-G Secure

Standards
FIPS 140-3, FIPS 186-4, FIPS 202, FIPS 180-4, FIPS 198-1, FIPS PUB 186-4, FIPS PUB 140-3, SP 800-38B, SP 800-108, SP 800-38D, SP 800-38F, SP 800-56B, SP 800-90B, SP 800-90A, SP 800-132, SP 800-52, SP 800-38A, SP 800-38C, SP 800-38G, PKCS 1, PKCS #1, PKCS#1, RFC 5288, ISO/IEC 24759

File metadata

Creation date D:20240509203024-04'00'
Modification date D:20240509203024-04'00'
Pages 120

References

Outgoing
  • 1311 - historical - NSA 3500

Heuristics ?

No heuristics are available for this certificate.

References ?

Updates ?

  • 04.07.2024 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4700,
  "dgst": "b3fa8714038b8943",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC-SHA2-256C839",
        "KAS-ECC-SSC Sp800-56Ar3A2161",
        "KDA OneStep Sp800-56Cr1A1192",
        "SHA2-224SHS 1780",
        "ECDSA SigGen (FIPS186-4)C829",
        "SHAKE-256A1197",
        "KAS-ECC Sp800-56Ar3A1219",
        "KDF ANS 9.63C825",
        "RSA SigGen (FIPS186-2)C824",
        "SHA-1SHS 1780",
        "AES-ECBC839",
        "PBKDFA1196",
        "HMAC-SHA-1C839",
        "HMAC-SHA2-384C839",
        "AES-GMACC839",
        "AES-KWPC1263",
        "KAS-IFC-SSCA1193",
        "ECDSA SigVer (FIPS186-4)C829",
        "AES-CMACC839",
        "AES-KWC1263",
        "DSA KeyGen (FIPS186-4)C823",
        "SHA3-256A1197",
        "SHAKE-128A1197",
        "HMAC-SHA2-512C839",
        "DSA PQGGen (FIPS186-4)C823",
        "RSA SigGen (FIPS186-4)A1199",
        "HMAC-SHA2-224C839",
        "DSA PQGVer (FIPS186-4)C823",
        "DSA SigVer (FIPS186-4)C823",
        "ECDSA KeyVer (FIPS186-4)C825",
        "RSA SigVer (FIPS186-4)C824",
        "SHA2-256SHS 1780",
        "TDES-ECBTDES 1311",
        "TDES-CBCTDES 1311",
        "KDA HKDF Sp800-56Cr1A1192",
        "Hash DRBGC830",
        "KDA TwoStep Sp800-56Cr1A1192",
        "KDF SP800-108C839",
        "KDF TLSC840",
        "SHA2-512SHS 1780",
        "KTS-IFCA1194",
        "Counter DRBGC821",
        "RSA KeyGen (FIPS186-4)C824",
        "RSA Decryption PrimitiveC839",
        "TDES-KWC1263",
        "ECDSA KeyGen (FIPS186-4)C825",
        "KAS-ECC CDH-ComponentC829",
        "SHA3-224A1197",
        "AES-CCMC839",
        "RSA Signature PrimitiveC839",
        "SHA3-512A1197",
        "AES-CTRC839",
        "AES-CBCC839",
        "AES-GCMC839",
        "DSA SigGen (FIPS186-4)C823",
        "SHA2-384SHS 1780"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.09",
        "2.0",
        "1.0",
        "4.03",
        "3.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1311"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1311"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1311"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 15
          },
          "ECDH": {
            "ECDH": 22
          },
          "ECDSA": {
            "ECDSA": 79
          }
        },
        "FF": {
          "DH": {
            "DH": 6,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 45
          }
        },
        "RSA": {
          "RSA 1024": 3
        }
      },
      "certification_process": {
        "OutOfScope": {
          "HSM. The LiquidSecurity Appliance is outside the module\u2019s cryptographic boundary and therefore out of scope of this validation. CNN35XX-NFBE-G Firmware: CNN35XX-NFBE-FW-2.09-0702 CNN35XX-NFBE-G Secure": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 7
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 10
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 16
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 4
          },
          "TLS": {
            "TLS": 43,
            "TLS 1.2": 3,
            "TLS v1.2": 1,
            "TLSv1.0": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 7
        },
        "MAC": {
          "MAC": 30
        }
      },
      "device_model": {},
      "ecc_curve": {
        "ANSSI": {
          "FRP256v1": 3
        },
        "Brainpool": {
          "brainpoolP160r1": 1,
          "brainpoolP224r1": 2,
          "brainpoolP256r1": 2,
          "brainpoolP320r1": 2,
          "brainpoolP384r1": 2,
          "brainpoolP512r1": 2
        },
        "Curve": {
          "Curve25519": 1
        },
        "NIST": {
          "B-163": 1,
          "B-233": 8,
          "B-283": 5,
          "B-409": 4,
          "B-571": 8,
          "K-233": 8,
          "K-283": 8,
          "K-409": 8,
          "K-571": 7,
          "P-192": 6,
          "P-224": 41,
          "P-256": 46,
          "P-384": 32,
          "P-521": 40
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 2,
          "#1311": 10,
          "#1780": 22,
          "#2": 2
        }
      },
      "fips_certlike": {
        "Certlike": {
          "# C839": 1,
          "# SHS": 11,
          "AES 128, 192": 1,
          "AES 256": 2,
          "AES-256": 2,
          "AES-CBC Encrypt/Decrypt; 128": 1,
          "AES-CTR Encrypt/Decrypt 128": 1,
          "AES-GCM Encrypt/Decrypt; 128": 2,
          "AES192": 1,
          "DES (192": 1,
          "HMAC-SHA-1": 32,
          "PKCS #1": 4,
          "PKCS 1": 5,
          "PKCS#1": 4,
          "RSA 1024": 3,
          "RSA PKCS 1": 1,
          "SHA- 1": 1,
          "SHA- 1, 224": 1,
          "SHA-1": 35,
          "SHA-1, 224": 3,
          "SHA-256": 2,
          "SHA-512": 2,
          "SHA1": 1,
          "SHA2- 224": 5,
          "SHA2- 256": 6,
          "SHA2- 384": 9,
          "SHA2- 512": 10,
          "SHA2-224": 52,
          "SHA2-256": 61,
          "SHA2-384": 49,
          "SHA2-512": 53,
          "SHA256": 1,
          "SHA3": 1,
          "SHA3-224": 3,
          "SHA3-256": 3,
          "SHA3-384": 3,
          "SHA3-512": 4,
          "SHS #1780": 22,
          "SHS 1780": 16,
          "SHS#1780": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 3": 7
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "PBKDF": {
          "PBKDF": 12
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 39,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 2,
            "SHA-512": 2,
            "SHA256": 1
          },
          "SHA3": {
            "SHA3": 1,
            "SHA3-224": 3,
            "SHA3-256": 3,
            "SHA3-384": 3,
            "SHA3-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 123
        },
        "RNG": {
          "RBG": 7
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 7,
          "FIPS 180-4": 112,
          "FIPS 186-4": 158,
          "FIPS 198-1": 55,
          "FIPS 202": 13,
          "FIPS PUB 140-3": 2,
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 24759": 2
        },
        "NIST": {
          "SP 800-108": 27,
          "SP 800-132": 8,
          "SP 800-38A": 31,
          "SP 800-38B": 8,
          "SP 800-38C": 4,
          "SP 800-38D": 29,
          "SP 800-38F": 28,
          "SP 800-38G": 1,
          "SP 800-52": 1,
          "SP 800-56B": 1,
          "SP 800-90A": 1,
          "SP 800-90B": 4
        },
        "PKCS": {
          "PKCS #1": 2,
          "PKCS 1": 3,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 5288": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 64,
            "AES-": 34,
            "AES-256": 2,
            "AES192": 1
          },
          "CAST": {
            "CAST": 3
          }
        },
        "DES": {
          "3DES": {
            "TDES": 8,
            "Triple-DES": 30
          },
          "DES": {
            "DES": 22
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 13,
            "HMAC": 29
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 2
        },
        "IBM": {
          "SSC": 14
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20240509203024-04\u002700\u0027",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_ActionId": "2dea9a8f-9588-405c-8d92-d3aa0684778b",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_ContentBits": "0",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_Enabled": "true",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_Method": "Standard",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_Name": "Unrestricted",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_SetDate": "2022-05-17T21:12:12Z",
      "/MSIP_Label_c968a81f-7ed4-4faa-9408-9652e001dd96_SiteId": "b64da4ac-e800-4cfc-8931-e607f720a1b8",
      "/ModDate": "D:20240509203024-04\u002700\u0027",
      "pdf_file_size_bytes": 1397196,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 120
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "ac150683387e12ffe16e6f78add356f218e16af0563cf50dfc21cd0f54624908",
    "policy_txt_hash": "038297154e7120ba8cf11a5a2db9e16e81bf42cbb1a43477fe84130f3c9ab43f"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in approved mode. When installed, initialized and configured as specified in Section 11 of the Security Policy. The module generates SSPs whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/May 2024_030624_0800.pdf",
    "date_sunset": "2029-05-29",
    "description": "The NITROXIII CNN35XX-NFBE HSM Family module by Marvell (formerly Cavium Inc.) is a high-performance purpose-built security solution for crypto acceleration. The module provides a FIPS 140-3 overall Level 3 security solution. The module is deployed in a PCIe slot to provide crypto and TLS 1.0/1.1/1.2 acceleration in a secure manner to the system host. It is typically deployed in a server or an appliance to provide crypto offload. The module\u2019s functions are accessed over the PCIe interface via an API defined by the module.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Operational environment: N/A",
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A",
      "Documentation requirements: N/A",
      "Cryptographic module security policy: N/A"
    ],
    "fw_versions": "CNN35XX-NFBE-FW-2.09-0702, CNN35XX-NFBE-SMW-2.09-0702, CNN35XX-UBOOT-4.03-03",
    "historical_reason": null,
    "hw_versions": "HW-1.0 (CNL3510-NFBE-G; CNL3510P-NFBE-G; CNL3530-NFBE-G; CNL3560-NFBE-G; CNL3560P-NFBE-G; CNN3510-NFBE-G; CNN3530-NFBE-G; CNN3560-NFBE-G; CNN3560P-NFBE-G); HW-2.0 (CNL3510-NFBE-2.0-G; CNL3510B-NFBE-2.0-G; CNL3510P-NFBE-2.0-G; CNL3510PB-NFBE-2.0-G; CNL3530-NFBE-2.0-G; CNL3530B-NFBE-2.0-G; CNL3560-NFBE-2.0-G; CNL3560B-NFBE-2.0-G; CNL3560P-NFBE-2.0-G; CNL3560PB-NFBE-2.0-G; CNN3505LP-NFBE-2.0-G; CNN3510-NFBE-2.0-G; CNN3510LP-NFBE-2.0-G; CNN3510LPB-NFBE-2.0-G; CNN3530-NFBE-2.0-G; CNN3560-NFBE-2.0-G; CNN3560P-NFBE-2.0-G); HW-3.0 (CNL3510-NFBE-3.0-G; CNL3510A-NFBE-3.0-G; CNL3510C-NFBE-3.0-G; CNL3510D-NFBE-3.0-G; CNL3510E-NFBE-3.0-G; CNL3510F-NFBE-3.0-G; CNL3510I-NFBE-3.0-G; CNL3510P-NFBE-3.0-G; CNL3530-NFBE-3.0-G; CNL3530A-NFBE-3.0-G; CNL3530B-NFBE-3.0-G; CNL3530C-NFBE-3.0-G; CNL3530D-NFBE-3.0-G; CNL3530E-NFBE-3.0-G; CNL3530F-NFBE-3.0-G; CNL3560-NFBE-3.0-G; CNL3560A-NFBE-3.0-G; CNL3560B-NFBE-3.0-G; CNL3560B-NFBE-3.0-G-FB; CNL3560C-NFBE-3.0-G; CNL3560D-NFBE-3.0-G; CNL3560E-NFBE-3.0-G; CNL3560F-NFBE-3.0-G; CNL3560P-NFBE-3.0-G; CNN3505LP-NFBE-3.0-G; CNN3505LPA-NFBE-3.0-G; CNN3505LPC-NFBE-3.0-G; CNN3505LPD-NFBE-3.0-G; CNN3505LPE-NFBE-3.0-G; CNN3505LPF-NFBE-3.0-G; CNN3510-NFBE-3.0-G; CNN3510A-NFBE-3.0-G; CNN3510C-NFBE-3.0-G; CNN3510D-NFBE-3.0-G; CNN3510E-NFBE-3.0-G; CNN3510F-NFBE-3.0-G; CNN3510LP-NFBE-3.0-G; CNN3510LPA-NFBE-3.0-G; CNN3510LPB-NFBE-3.0-G; CNN3510LPC-NFBE-3.0-G; CNN3510LPD-NFBE-3.0-G; CNN3510LPE-NFBE-3.0-G; CNN3510LPF-NFBE-3.0-G; CNN3530-NFBE-3.0-G; CNN3530A-NFBE-3.0-G; CNN3530C-NFBE-3.0-G; CNN3530D-NFBE-3.0-G; CNN3530E-NFBE-3.0-G; CNN3530F-NFBE-3.0-G; CNN3560-NFBE-3.0-G; CNN3560A-NFBE-3.0-G; CNN3560C-NFBE-3.0-G; CNN3560D-NFBE-3.0-G; CNN3560E-NFBE-3.0-G; CNN3560F-NFBE-3.0-G; CNN3560P-NFBE-3.0-G)",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "NITROXIII CNN35XX-NFBE HSM Family",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-05-30",
        "lab": "LEIDOS CSTL",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Marvell Semiconductor, Inc.",
    "vendor_url": "http://www.marvell.com"
  }
}