Upload a ZIP archive containing multiple evidence sources (SBOMs, Terraform state, Kubernetes manifests, Ansible playbooks, package locks, system info) and generate FIPS 140-2/140-3 cryptographic compliance assessment. Detects cryptographic libraries, validates FIPS compliance, and checks for weak algorithms.
Customer API key for authentication
Name for the FIPS assessment
"production-crypto-audit"
Output format for the assessment
oscal, yaml, json "json"
Base64-encoded ZIP archive. Supported file types: sbom.json/spdx.json (SBOM), *.tfstate (Terraform), *.yaml/manifest.yaml (Kubernetes), playbook.yaml (Ansible), package-lock.json/Cargo.lock/go.mod/poetry.lock (package managers), system_info.json/openssl.json (system crypto info)
"UEsDBBQAAAAIAA=="
Evidence assessment completed successfully
Unique identifier for this assessment
Assessment status
completed, failed Timestamp when assessment was created
Generated artifacts (assessment files, diagrams)