Date Published: November 2018
Comments Due: February 18, 2019 (public comment period is CLOSED)
Email Questions to: tls-cert-mgmt-nccoe@nist.gov
Planning Note (1/29/2019):
The comment closing date has been extended to February 18, 2019 (originally Dec. 31, 2018) for preliminary drafts of Volume A (Executive Summary) and Volume B (Approach, Architecture, and Security Characteristics).
, , ,
This project is using commercially available technologies to develop a cybersecurity reference design that demonstrates how to establish, assign, change and track an inventory of Transport Layer Security (TLS) certificates in medium and large enterprises. Improper oversight of TLS server certificates--which can number into the thousands for a single organization--can cause system outages and security breaches, which can result in revenue loss, harm to reputation, and exposure of confidential data to attackers.
We will use this feedback to help shape the latter volumes of this guide, scheduled for release in full (Volumes A,B,C,D) in the spring of 2019. In the interim, organizations can start adopting NIST's recommended best practices surrounding the oversight of large scale TLS server certificates.
Access Control; Audit and Accountability; Configuration Management; Program Management; System and Information Integrity
Publication:
SP 1800-16B (Prelim. Draft 1)
SP 1800-16A (Prelim. Draft 1)
Supplemental Material:
SP 1800-16A (Prelim. Draft 1) (pdf)
Submit Comments (other)
Project Homepage (other)
Related NIST Publications:
Document History:
11/29/18: SP 1800-16 (Draft)
07/17/19: SP 1800-16 (Draft)
06/16/20: SP 1800-16 (Final)
Security and Privacy
audit & accountability; authentication; awareness training & education; key management; program management
Technologies
networks
Applications
cybersecurity framework
Laws and Regulations
Cyber Security R&D Act; Cybersecurity Enhancement Act