Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-57 Part 2 Rev. 1

Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations

Date Published: May 2019

Supersedes: SP 800-57 Part 2 (08/25/2005)

Author(s)

Elaine Barker (NIST), William Barker (Dakota Consulting)

Abstract

Keywords

authentication; authorization; availability; backup; certification authority; compromise; confidentiality; cryptographic key; cryptographic module; digital signatures; encryption; integrity; inventory management; key information; key management; cryptographic Key Management Policy; key recovery; private key; public key; public key infrastructure; security plan; symmetric key
Control Families

Access Control; Audit and Accountability; Contingency Planning; Media Protection; Planning; System and Communications Protection; System and Information Integrity;

Documentation

Publication:
SP 800-57 Part 2 Rev. 1 (DOI)
Local Download

Supplemental Material:
None available

Other Parts of this Publication:
SP 800-57 Part 1 Rev. 4
SP 800-57 Part 3 Rev. 1

Document History:
04/06/18: SP 800-57 Part 2 Rev. 1 (Draft)
11/20/18: SP 800-57 Part 2 Rev. 1 (Draft)
05/23/19: SP 800-57 Part 2 Rev. 1 (Final)