U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.


We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

SP 800-57 Part 2 Rev. 1

Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations

Date Published: May 2019

Supersedes: SP 800-57 Part 2 (08/25/2005)


Elaine Barker (NIST), William Barker (Dakota Consulting)



authentication; authorization; availability; backup; certification authority; compromise; confidentiality; cryptographic key; cryptographic module; digital signatures; encryption; integrity; inventory management; key information; key management; cryptographic Key Management Policy; key recovery; private key; public key; public key infrastructure; security plan; symmetric key
Control Families

Access Control; Audit and Accountability; Contingency Planning; Media Protection; Planning; System and Communications Protection; System and Information Integrity


SP 800-57 Part 2 Rev. 1 (DOI)
Local Download

Supplemental Material:
None available

Other Parts of this Publication:
SP 800-57 Part 1 Rev. 4
SP 800-57 Part 3 Rev. 1

Document History:
04/06/18: SP 800-57 Part 2 Rev. 1 (Draft)
11/20/18: SP 800-57 Part 2 Rev. 1 (Draft)
05/23/19: SP 800-57 Part 2 Rev. 1 (Final)