This is a potential security issue, you are being redirected to https://csrc.nist.gov.
Date Published: October 2019
Comments Due: December 6, 2019 (public comment period is CLOSED)
Email Questions to: firstname.lastname@example.org
This document provides general guidance and best practices for the management of cryptographic keying material. Among other changes, this revision emphasizes the protection needed for the metadata associated with keys; includes discussions on access control, identity authentication, and inventory management for keys and certificates; and provides guidance consistent with Federal Information Processing Standards (FIPS) Publication 201, Personal Identity Verification (PIV) of Federal Employees and Contractors, and SP 800-63, Digital Identity Guidelines. Appendix C contains a complete list of changes.
NOTE: A call for patent claims is included on page iv of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.
Access Control; Audit and Accountability; Contingency Planning; Media Protection; Planning; System and Communications Protection; System and Information Integrity