Date Published: June 2020
Author(s)
Mehwish Akram (MITRE), William Barker (Strativia), Rob Clatterbuck (Thales Trusted Cyber Technologies), Donna Dodson (NIST), Brandon Everhart (MITRE), Jane Gilbert (Thales Trusted Cyber Technologies), William Haag (NIST), Brian Johnson (MITRE), Alexandros Kapasouris (Symantec), Dung Lam (F5), Brett Pleasant (MITRE), Mary Raguso (MITRE), Murugiah Souppaya (NIST), Susan Symington (MITRE), Paul Turner (Venafi), Clint Wilson (DigiCert)
This NIST Cybersecurity Practice Guide shows large and medium enterprises how to employ a formal TLS certificate management program to address certificate-based risks and challenges. It describes the TLS certificate management challenges faced by organizations; provides recommended best practices for large-scale TLS server certificate management; describes an automated proof-of-concept implementation that demonstrates how to prevent, detect, and recover from certificate-related incidents; and provides a mapping of the demonstrated capabilities to the recommended best practices and to NIST security guidelines and frameworks. This NIST Cybersecurity Practice Guide consists of the following volumes: Volume A: Executive Summary; Volume B: Security Risks and Recommended Best Practices; Volume C: Approach, Architecture, and Security Characteristics; Volume D: How-To Guides – instructions for building the example solution.
This NIST Cybersecurity Practice Guide shows large and medium enterprises how to employ a formal TLS certificate management program to address certificate-based risks and challenges. It describes the TLS certificate management challenges faced by organizations; provides recommended best practices...
See full abstract
This NIST Cybersecurity Practice Guide shows large and medium enterprises how to employ a formal TLS certificate management program to address certificate-based risks and challenges. It describes the TLS certificate management challenges faced by organizations; provides recommended best practices for large-scale TLS server certificate management; describes an automated proof-of-concept implementation that demonstrates how to prevent, detect, and recover from certificate-related incidents; and provides a mapping of the demonstrated capabilities to the recommended best practices and to NIST security guidelines and frameworks. This NIST Cybersecurity Practice Guide consists of the following volumes: Volume A: Executive Summary; Volume B: Security Risks and Recommended Best Practices; Volume C: Approach, Architecture, and Security Characteristics; Volume D: How-To Guides – instructions for building the example solution.
Hide full abstract
Keywords
authentication; certificate; cryptography; identity; key; key management; PKI; private key; public key; public key infrastructure; server; signature; TLS; Transport Layer Security
Control Families
Access Control; Audit and Accountability; Configuration Management; Program Management; System and Information Integrity