Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-57 Part 2 Rev. 1

Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations

Date Published: May 2019

Supersedes: SP 800-57 Part 2 (August 2005)

Author(s)

Elaine Barker (NIST), William Barker (Dakota Consulting)

Abstract

Keywords

authentication; authorization; availability; backup; certification authority; compromise; confidentiality; cryptographic key; cryptographic module; digital signatures; encryption; integrity; inventory management; key information; key management; cryptographic Key Management Policy; key recovery; private key; public key; public key infrastructure; security plan; symmetric key
Control Families

Access Control; Audit and Accountability; Contingency Planning; Media Protection; Planning; System and Communications Protection; System and Information Integrity;

Documentation

Publication:
SP 800-57 Part 2 Rev. 1 (DOI)
Local Download

Supplemental Material:
None available

Other Parts of this Publication:
SP 800-57 Part 1 Rev. 4
SP 800-57 Part 3 Rev. 1

Document History:
Draft SP 800-57 Part 2 Rev. 1 (4/6/18)
Draft SP 800-57 Part 2 Rev. 1 (11/20/18)
SP 800-57 Part 2 Rev. 1 (5/23/19)

Topics

Security and Privacy
authentication; key management; public key infrastructure

Laws and Regulations
Cybersecurity Enhancement Act;