NITROXIII CNN35XX-NFBE HSM Family

Certificate #3254

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 02.08.2018 , 17.08.2018 , 09.10.2018 , 30.01.2019 , 02.04.2019 , 13.06.2019 , 15.07.2019 , 18.07.2019 , 12.08.2019 , 18.11.2019 , 01.07.2020 , 10.07.2020 , 01.12.2020 , 06.07.2021 , 09.07.2021
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode and initialized and configured per Section 10 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Mitigation of Other Attacks: N/A
Description CNN35XX-NFBE HSM Family is a high performance purpose built solution for key management and crypto acceleration compliance to FIPS 140-2. The module supports flexible key store that can be partitioned up to 32 individually managed and isolated partitions. This is a SRIOV capable PCIe adapter and can be used in a virtualization environment to extend services like virtual key management, crypto and TLS offloads to VMs in dedicated I/O channels. This product is suitable for PKI vendors, SSL servers/load balancers.
Version (Hardware) P/Ns CNL3560P-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3560P-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560P-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560B-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560B-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3560-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560A-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560C-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560D-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560E-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560F-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3530-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3530-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530B-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3530B-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530A-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530C-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530D-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530E-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530F-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3510-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510B-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510P-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3510P-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510P-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510PB-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560PB-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510A-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510C-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510D-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510E-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560P-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3560P-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3560P-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3560-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3560-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560A-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560C-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560D-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560E-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3530-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3530-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530A-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530C-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530D-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530E-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3510-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3510-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510A-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510C-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510D-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510E-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LP-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3510LP-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPB-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3510LPB-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPA-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPC-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPD-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPE-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPF-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LP-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3505LP-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPA-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPC-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPD-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPE-NFBE-3.0-G [1, 2, 3, 4, 7] and CNN3505LPF-NFBE-3.0-G [1, 2, 3, 4, 7]
Version (Firmware) CNN35XX-NFBE-FW-2.04 build 48 [1], CNN35XX-NFBE-FW-2.04 build 49 [2], CNN35XX-NFBE-FW-2.04 build 50 [3], CNN35XX-NFBE-FW-2.04 build 52 [4], CNN35XX-NFBE-FW-2.05 build 15 [5], CNN35XX-NFBE-FW-2.05 build 18 [6] and CNN35XX-NFBE-FW-2.05 build 16 [7]
Vendor Marvell Semiconductor, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, RC4, Triple-DES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-224, SHA-512, SHA256, MD5
Schemes
MAC, Key agreement, Key Agreement
Protocols
SSH, SSL, TLS, TLS 1.2
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-256, P-384, P-521, P-192, K-233, K-283, K-409, B-233, B-283, B-409, B-571, K-571, K-163, B-163
Block cipher modes
ECB, CBC, CTR, GCM

Security level
Level 3

Standards
FIPS 140-2, FIPS 186-2, FIPS 186-4, FIPS PUB 186-4, FIPS PUB 140-2, SP 800-38D, SP 800-90A, SP 800-38F, SP 800-133, SP 800-56A, SP 800-56B, SP 800-108, SP 800-135, SP 800-52, SP 800-56, PKCS #1, PKCS#1, RFC 5288

File metadata

Author Kancharla, Phani Kumar
Creation date D:20210707151307-07'00'
Modification date D:20210707151413-07'00'
Pages 41
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 17.11.238

References

Outgoing
  • 53 - historical - PERMIT/Gate 4520™ Cryptographic Module
  • 2218 - historical - Tripwire Cryptographic Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3254,
  "dgst": "d67e8edaa3a287c3",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#2035",
        "HMAC#1233",
        "CVL#563",
        "SHS#2652",
        "HMAC#2019",
        "KBKDF#65",
        "AES#4104",
        "DRBG#680",
        "KTS#2242",
        "RSA#1634",
        "DSA#916",
        "AES#2033",
        "ECDSA#589",
        "AES#3206",
        "SHS#1780",
        "Triple-DES#2242",
        "CVL#167",
        "AES#3205",
        "AES#2034",
        "Triple-DES#1311"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.05",
        "2.0",
        "2.04",
        "3.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3741"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "3741"
        ]
      },
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "53",
          "2218"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "53",
          "2218"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "53",
        "2218"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 17
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 6,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 4
          }
        },
        "RSA": {
          "RSA 2048": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 8
        },
        "GCM": {
          "GCM": 11
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 9
          },
          "TLS": {
            "TLS": 36,
            "TLS 1.2": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 2
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 1,
          "B-233": 4,
          "B-283": 4,
          "B-409": 4,
          "B-571": 4,
          "K-163": 1,
          "K-233": 4,
          "K-283": 4,
          "K-409": 4,
          "K-571": 3,
          "P-192": 2,
          "P-224": 8,
          "P-256": 8,
          "P-384": 4,
          "P-521": 10
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "# 3206": 1,
          "#1": 3,
          "#1233": 1,
          "#1311": 1,
          "#1634": 1,
          "#167": 2,
          "#1780": 1,
          "#2": 1,
          "#2019": 1,
          "#2033": 1,
          "#2034": 1,
          "#2035": 1,
          "#2218": 1,
          "#2242": 2,
          "#2652": 1,
          "#3205": 1,
          "#3206": 1,
          "#4104": 1,
          "#53": 1,
          "#563": 2,
          "#589": 1,
          "#65": 1,
          "#680": 2,
          "#916": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128, 192": 2,
          "AES 256": 5,
          "AES-256": 2,
          "CVL #167": 1,
          "CVL #563": 1,
          "DRBG (Cert. #680": 1,
          "Diffie-Hellman (CVL #167": 1,
          "HMAC SHA-1, 224": 1,
          "HMAC SHA256": 1,
          "HMAC-SHA-1, 224": 6,
          "HMAC-SHA-256": 2,
          "HMAC-SHA-256, 384": 2,
          "PKCS #1": 6,
          "PKCS#1": 1,
          "RSA 2048": 4,
          "RSA PKCS#1": 1,
          "SHA-1": 5,
          "SHA-1, 224": 6,
          "SHA-224": 5,
          "SHA-256": 3,
          "SHA-512": 1,
          "SHA256": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 7
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 11
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 3,
            "SHA-512": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        },
        "RNG": {
          "RNG": 4
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 7,
          "FIPS 186-2": 1,
          "FIPS 186-4": 1,
          "FIPS PUB 140-2": 2,
          "FIPS PUB 186-4": 1
        },
        "NIST": {
          "SP 800-108": 1,
          "SP 800-133": 5,
          "SP 800-135": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 9,
          "SP 800-52": 1,
          "SP 800-56": 1,
          "SP 800-56A": 10,
          "SP 800-56B": 9,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS #1": 3,
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 5288": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 34,
            "AES-256": 2
          },
          "RC": {
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 10
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 19,
            "HMAC-SHA-256": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Kancharla, Phani Kumar",
      "/Company": "",
      "/ContentTypeId": "0x010100552E86808EE46C49920286B6F458310E",
      "/CreationDate": "D:20210707151307-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/ModDate": "D:20210707151413-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 17.11.238",
      "/SourceModified": "D:20210527205156",
      "/Title": "",
      "pdf_file_size_bytes": 717307,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://support.cavium.com/websilo/document/JmlfaWQ9OTQ3MCZwX2lkPTc0MAAA"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 41
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "0ebca9dfb27964b93927e4318e6086d06bb94d57cb0735d782499a7eaa96d732",
    "policy_txt_hash": "ede1d9fdadd7d63b958743125dc2b016c9a2549588bf3965baa22b903f9fe1ea"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode and initialized and configured per Section 10 of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertAug2018.pdf",
    "date_sunset": null,
    "description": "CNN35XX-NFBE HSM Family is a high performance purpose built solution for key management and crypto acceleration compliance to FIPS 140-2. The module supports flexible key store that can be partitioned up to 32 individually managed and isolated partitions. This is a SRIOV capable PCIe adapter and can be used in a virtualization environment to extend services like virtual key management, crypto and TLS offloads to VMs in dedicated I/O channels. This product is suitable for PKI vendors, SSL servers/load balancers.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "CNN35XX-NFBE-FW-2.04 build 48 [1], CNN35XX-NFBE-FW-2.04 build 49 [2], CNN35XX-NFBE-FW-2.04 build 50 [3], CNN35XX-NFBE-FW-2.04 build 52 [4], CNN35XX-NFBE-FW-2.05 build 15 [5], CNN35XX-NFBE-FW-2.05 build 18 [6] and CNN35XX-NFBE-FW-2.05 build 16 [7]",
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": "P/Ns CNL3560P-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3560P-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560P-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560B-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560B-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3560-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560A-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560C-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560D-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560E-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3560F-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3530-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3530-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530B-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3530B-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530A-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530C-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530D-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530E-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3530F-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3510-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510B-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510P-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNL3510P-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510P-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510PB-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3560PB-NFBE-2.0-G [1, 2, 3, 4, 7], CNL3510A-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510C-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510D-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510E-NFBE-3.0-G [1, 2, 3, 4, 7], CNL3510F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560P-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3560P-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3560P-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3560-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3560-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560A-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560C-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560D-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560E-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3560F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3530-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3530-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530A-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530C-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530D-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530E-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3530F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510-NFBE-G [1, 2, 3, 4, 5, 6, 7], CNN3510-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3510-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510A-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510C-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510D-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510E-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510F-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LP-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3510LP-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPB-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3510LPB-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPA-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPC-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPD-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPE-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3510LPF-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LP-NFBE-2.0-G [1, 2, 3, 4, 7], CNN3505LP-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPA-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPC-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPD-NFBE-3.0-G [1, 2, 3, 4, 7], CNN3505LPE-NFBE-3.0-G [1, 2, 3, 4, 7] and CNN3505LPF-NFBE-3.0-G [1, 2, 3, 4, 7]",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "NITROXIII CNN35XX-NFBE HSM Family",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-08-02",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-08-17",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-10-09",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-01-30",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-04-02",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-06-13",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-07-15",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-07-18",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-08-12",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-11-18",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-07-01",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-07-10",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-12-01",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-07-06",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-07-09",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "Marvell Semiconductor, Inc.",
    "vendor_url": "http://www.marvell.com"
  }
}