April 2024
Intermediate to advanced
224 pages
4h 48m
English
There are several requirements in FIPS 140-3 and the subordinate algorithm documents that enforce the use of vulnerable constructs or permit combinations and parameterizations that would undermine security.
The best course of action is to be aware of these issues and work around them by providing mitigations to the vulnerability and not making poor parameter and configuration choices.