For compliance with FIPS 140-1/2, is it OK to just validate a hardware module that is used?
Cryptographic implementations (“modules”) can be hardware, software, or a combination of both. If an application uses multiple cryptographic modules then all of them must be FIPS 140-1/2 validated. All cryptography must be performed by FIPS 140-1/2 validated components in order to claim FIPS 140-1/2 validation for the application.