Releases for FIPS 140-3 Level 3 deployments
The following ProtectToolkit 7 versions have been released to date for FIPS 140-3 Level 3 deployments:
Note
Thales recommends using matching minor versions of ProtectToolkit 7, the ProtectServer 3 HSM Firmware, and the ProtectServer 3 Network HSM Appliance Software for most deployments. Some new features and enhancements for a version of ProtectToolkit 7 listed below may require a specific firmware version. In such cases, the required firmware minor version is mentioned in parentheses.
If you are reconfiguring a ProtectServer 3 HSM deployment for FIPS 140-3 Level 3-compliance, read Advisory notes to take note of the operational changes that this firmware version introduces and reconfigure applications where necessary, before reconfiguring the deployment for 140-3 Level 3-compliance.
ProtectToolkit 7.3.1
Note
ProtectToolkit 7.3.1 includes all the changes that Thales introduced with ProtectToolkit 7.2.3 and ProtectToolkit 7.2.1. Refer to the CRN entries of ProtectToolkit 7.2.3 and ProtectToolkit 7.2.1 for more information about which features, enhancements, and advisory notes are applicable to ProtectToolkit 7.3.1.
New features and enhancements
New ProtectToolkit 7 operating system support
ProtectToolkit 7.3.1 can be installed on RHEL 7.9, 8.9, 9.3 and Ubuntu 22.04.4 LTS.
Advisory notes
There are no advisory notes for this release.
ProtectToolkit 7.3.0
Note
ProtectToolkit 7.3.0 does not include all the changes that Thales introduced with ProtectToolkit 7.2.3. Refer to the CRN entries of ProtectToolkit 7.2.3 for more information about which features, enhancements, and advisory notes are not applicable to ProtectToolkit 7.3.0.
New features and enhancements
ProtectToolkit 7.3.0 introduces several new features and enhancements, and resolves various known issues described in Known and resolved issues.
New ProtectToolkit 7 operating system support
ProtectToolkit 7.3.0 can be installed on SUSE Linux Enterprise Server (SLES) 15 SP4.
ProtectServer 3 HSM factory reset capability (requires firmware 7.03.00)
The ProtectServer 3 HSM can be reset to factory settings, erasing all cryptographic objects, ProtectServer identity keys and certificates, and functionality modules (FMs). For more information, refer to Resetting the HSM to factory settings.
ProtectServer 3 HSM on-demand self-tests (requires firmware 7.03.00)
The ctconf utility can be used to trigger a ProtectServer 3 HSM self-test. For more information about these self-tests, refer to Self-tests.
Advisory notes
There are no advisory notes for this release.